Malware Removal: Analyzing an Infected System

IT Security    |    Beginner
  • 13 videos | 1h 44m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 15 users Rating 4.6 of 15 users (15)
Familiarization with the different types of malware analysis and the tools used to analyze malware is a critical skill for IT security professionals. In this course, you'll explore the characteristics of malware and the impact the malware has on the infected system. You'll learn how to identify different malware analysis techniques, such as static and dynamic malware analysis, to discover activities performed by malware. You'll also examine some of the tools used to perform both static and dynamic malware analysis and how to use a disassembler to view malware code.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize why malware analysis is important
    Describe the purpose of static malware analysis
    Identify the purpose of dynamic malware analysis
    Recognize common malware characteristics at the windows api level (registry manipulation, keylogging, http communications, droppers)
    Inspect the static properties of malware
    Perform dynamic malware analysis
  • Recognize the impacts of the malware you discover
    Locate open ports and running processes used by malware and terminate the malware process
    Use tools to monitor malware processes
    Use wireshark to monitor malware network activity
    Inspect malicious code and follow program control flow to recognize decision points during execution
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 3m 16s
    Upon completion of this video, you will be able to understand why malware analysis is important. FREE ACCESS
  • Locked
    3.  Introduction to Static Analysis
    4m 11s
    Upon completion of this video, you will be able to describe the purpose of static malware analysis. FREE ACCESS
  • Locked
    4.  Introduction to Dynamic Analysis
    2m 45s
    Learn how to identify the purpose of dynamic malware analysis. FREE ACCESS
  • Locked
    5.  Malware Characteristics
    4m 9s
    After completing this video, you will be able to recognize common malware characteristics, such as registry manipulation, keylogging, HTTP communications, and droppers, at the Windows API level. FREE ACCESS
  • Locked
    6.  Static Malware Analysis
    22m 17s
    In this video, learn how to inspect the static properties of malware. FREE ACCESS
  • Locked
    7.  Dynamic Malware Analysis
    14m 53s
    In this video, you will be performing dynamic malware analysis. FREE ACCESS
  • Locked
    8.  Malware Impacts
    3m 48s
    After completing this video, you will be able to recognize the impacts of the malware you discover. FREE ACCESS
  • Locked
    9.  Ports and Processes Used By Malware
    12m 44s
    Find out how to locate open ports and running processes used by malware and terminate the malware process. FREE ACCESS
  • Locked
    10.  Process Monitor
    12m 3s
    During this video, you will learn how to use tools to monitor malware processes. FREE ACCESS
  • Locked
    11.  Wireshark
    11m 10s
    In this video, find out how to use Wireshark to monitor network activity for malware. FREE ACCESS
  • Locked
    12.  Malicious Code and Program Flow
    10m 37s
    In this video, you will inspect malicious code and follow program control flow to recognize decision points during execution. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.4 of 56 users Rating 4.4 of 56 users (56)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 31 users Rating 4.7 of 31 users (31)
Rating 4.4 of 36 users Rating 4.4 of 36 users (36)
Rating 4.4 of 56 users Rating 4.4 of 56 users (56)