PLU | Analyzing Malware For .NET And Java Binaries (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 15, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,086
    Likes Received:
    446
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Josh Stroschein
    Full Title: Analyzing Malware For .NET And Java Binaries
    Year: 2018
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides PDF)
    Time: 01:42:00
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 450 kbps
    Audio: AAC at 74 Kbps, 2 channels, 44.1 KHz



    This course will teach the basics of Java and .NET runtimes, introduce tools and techniques for effectively reverse engineering these binary types, show you how to identify indicators of compromise, and get hands-on with real world malware..

    The ability to quickly and effectively analyse a wide variety of malware is a critical skill for anyone performing incident response, working in a security operations center (SOC), or analyzing malware. In this course, Analyzing Malware for .NET and Java Binaries, you will gain the skills necessary to effectively analyze Java and .NET malware. First, you will learn how .NET and Java binaries differ from other malware. Next, you will learn the tools, techniques, and workflows necessary to reverse engineer these types of binaries. Finally, you will apply everything you learned through hands-on labs in which you will analyze real-world malware. When you are finished with this course, you will have the knowledge and skills necessary to analyze .NET and Java binaries, giving you the ability to effectively investigate a wider variety of malware.


    Lessons:
    Course Overview
    01. Course Overview
    Introduction
    02. Course Introduction
    03. Why Analyze .NET and Java Malware
    04. Module Introduction
    05. Understanding the Difference Between Compiled and Interpreted Languages
    06. Code Obfuscation Techniques
    07. Conclusion
    Analyzing .NET Binaries
    08. Introduction
    09. Details of the .NET Framework
    10. Understanding .NET Bytecode
    11. Leveraging Tools to Reverse Engineer .NET Binaries
    12. Tracing Program Behavior
    13. DEMO: Applying What You Have Learned
    14. Lab: Analyzing Your First .NET Binary
    15. Conclusion
    Analyzing Java Binaries
    16. Introduction
    17. Details of the Java Runtime Environment
    18. Understanding Java Bytecode
    19. Leveraging Tools to Reverse Engineer Java Binaries
    20. DEMO: Applying What You Have Learned
    21. Lab: Analyzing Your First Java Binary
    22. Conclusion
    Performing Real-world Analysis
    23. Introduction
    24. Analyzing .NET Ransomware
    25. .NET Ransomware Lab
    26. Analyzing a Java Remote Access Trojan (RAT)
    27. Java Remote Access Trojan Lab
    28. Conclusion
    Leveling up Your Skills
    29. Introduction
    30. What You Can Now Do
    31. Next Steps
    32. Conclusion


    -------------