PLU | Malware Analysis: The Big Picture (2017 EN)

Discussion in 'Information Technology' started by Kanka, Nov 29, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Christopher Rees
    Full Title: Malware Analysis: The Big Picture
    Year: 2017
    Language: English
    Genre: Educational: Security
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:13:35
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 150 kbps
    Audio: AAC at 96 Kbps, 2 channels, 44.1 KHz



    Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.

    Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you'll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you're finished with this course, you'll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Malware: Why Should You Care?
    02. Intro
    03. Who Should Watch This?
    04. What Is Malware?
    05. Why Should You Care?
    06. How Do Systems Get Infected?
    07. Major Forms of Malware
    08. Viruses
    09. Worms
    10. Trojans Horse Programs
    11. Malicious Mobile Code and Blended Attacks
    12. Attacker Tools
    13. Timeline of Noteworthy Malware Outbreaks
    14. Goals of Malware Analysis and Module Review
    3. Best Practices
    15. Module Introduction
    16. Cost of Malware Infections
    17. Incident Prevention
    18. Preparation and Communication
    19. Malware Incident Handling Best Practices and Layered Defense
    20. Anti-virus Software
    21. End-point Protection Tools
    22. Identification and Documentation
    23. Intrusion Prevention Systems
    24. Best Practices Around Virtualization and Application Whitelisting
    25. Virtualization and Snapshots
    26. Goals of Malware Analysis Overview
    27. Manual vs. Automatic Malware Detection
    28. Malware Analysis Tools
    29. Malware Analysis Lab
    30. Recovery After an Infection
    31. NIST Special Publications Around Computer Security
    4. Tools and Teams
    32. Module Intro & Importance of a Properly Trained Response Team
    33. Phases of Incident Response
    34. Preparation
    35. Detection and Analysis
    36. Stopping the Spread of Malware, Eradication and Recovery
    37. Benefits of Proper Malware Analysis
    38. Indicators of Compromise (IOC)
    39. Malware Analysis Techniques
    40. Domain Generation Algorithm (DGA)
    41. Types of Malware Analysis
    42. Malware Analysis Tools
    43. Virtual Lab for Malware Analysis
    44. Module Review
    5. Investigative and Legal Considerations
    45. Module Intro
    46. Acquiring Evidence During a Malware Investigation
    47. Questions to Consider
    48. Types of Companies
    49. Golden Hour Decisions
    50. Digital Forensics and Incident Response
    51. Digital Evidence
    52. NIST SP 800-86
    53. Handling the Press
    54. Company Board and Their Main Goals
    55. What's Important to the Board
    56. Module and Course Review


    -------------