Company: Pluralsight Author: Christopher Rees Full Title: Malware Analysis: The Big Picture Year: 2017 Language: English Genre: Educational: Security Skill Level: Beginner Price: - - Files: MP4 (+ Slides .PDF) Time: 02:13:35 Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 150 kbps Audio: AAC at 96 Kbps, 2 channels, 44.1 KHz Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact. Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you'll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you're finished with this course, you'll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment. Lessons: 1. Course Overview 01. Course Overview 2. Malware: Why Should You Care? 02. Intro 03. Who Should Watch This? 04. What Is Malware? 05. Why Should You Care? 06. How Do Systems Get Infected? 07. Major Forms of Malware 08. Viruses 09. Worms 10. Trojans Horse Programs 11. Malicious Mobile Code and Blended Attacks 12. Attacker Tools 13. Timeline of Noteworthy Malware Outbreaks 14. Goals of Malware Analysis and Module Review 3. Best Practices 15. Module Introduction 16. Cost of Malware Infections 17. Incident Prevention 18. Preparation and Communication 19. Malware Incident Handling Best Practices and Layered Defense 20. Anti-virus Software 21. End-point Protection Tools 22. Identification and Documentation 23. Intrusion Prevention Systems 24. Best Practices Around Virtualization and Application Whitelisting 25. Virtualization and Snapshots 26. Goals of Malware Analysis Overview 27. Manual vs. Automatic Malware Detection 28. Malware Analysis Tools 29. Malware Analysis Lab 30. Recovery After an Infection 31. NIST Special Publications Around Computer Security 4. Tools and Teams 32. Module Intro & Importance of a Properly Trained Response Team 33. Phases of Incident Response 34. Preparation 35. Detection and Analysis 36. Stopping the Spread of Malware, Eradication and Recovery 37. Benefits of Proper Malware Analysis 38. Indicators of Compromise (IOC) 39. Malware Analysis Techniques 40. Domain Generation Algorithm (DGA) 41. Types of Malware Analysis 42. Malware Analysis Tools 43. Virtual Lab for Malware Analysis 44. Module Review 5. Investigative and Legal Considerations 45. Module Intro 46. Acquiring Evidence During a Malware Investigation 47. Questions to Consider 48. Types of Companies 49. Golden Hour Decisions 50. Digital Forensics and Incident Response 51. Digital Evidence 52. NIST SP 800-86 53. Handling the Press 54. Company Board and Their Main Goals 55. What's Important to the Board 56. Module and Course Review Our members see more. Join us! ------------- Our members see more. Join us!