Fireeye Mandiant Malware Analysis Course
English | Tutorial | Size: 9.91 GB
This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, hands-on approach. The course explains how to find the functionality of a program by analyzing disassembly and seeing how it modifies a system and its resources as it runs in a debugger.
The course discusses how to extract host- and network-based indicators from a malicious program. It also covers dynamic analysis and the Windows APIs most often used by malware authors. Each section includes in-class demonstrations and hands-on labs with real malware so learners can apply their new skills.
Learning Objectives
After completing this course, learners should be able to:
Quickly perform a malware autopsy
Understand basic yet effective methods for analyzing running malware in a safe environment, such as virtual machines
Understand the basics of the x86 assembly language
Use IDA Pro, the main tool for disassembly analysis
Understand a wide range of Windows-specific concepts that are relevant to analyzing Windows malware
Monitor and change malware behavior, as it runs, at a low level
Who should attend
Software developers, information security professionals, incident responders, computer security researchers, corporate investigators and others who need to understand how malware operates and the processes involved in performing malware analysis.
Prerequisites
Excellent knowledge of computer and operating system fundamentals. Computer programming fundamentals and Windows Internals experience are highly recommended.
Delivery method
In-classroom or virtual instructor-led training
RAPIDGATOR
rapidgator.net/file/5f9b6459f2f145712f7dafbac3074624/Fireeye_Mandiant_Malware_Analysis_Course.part01.rar.html
rapidgator.net/file/570bfaa09b2fe2ccfa19239bd030bdbc/Fireeye_Mandiant_Malware_Analysis_Course.part02.rar.html
rapidgator.net/file/b84430917d199581e499b5abd18f65d1/Fireeye_Mandiant_Malware_Analysis_Course.part03.rar.html
rapidgator.net/file/d3f357240dee31ed79839d41d7e38680/Fireeye_Mandiant_Malware_Analysis_Course.part04.rar.html
rapidgator.net/file/6c04e3b76667dc1ecfea45393b54b67b/Fireeye_Mandiant_Malware_Analysis_Course.part05.rar.html
rapidgator.net/file/179163fa18ecbc30ef6c958e0b49aa2a/Fireeye_Mandiant_Malware_Analysis_Course.part06.rar.html
rapidgator.net/file/6f0e55500bde999ce9509749409bb11d/Fireeye_Mandiant_Malware_Analysis_Course.part07.rar.html
rapidgator.net/file/716c3049d006ceccc375c3e359578327/Fireeye_Mandiant_Malware_Analysis_Course.part08.rar.html
rapidgator.net/file/d23867c2742a26add8f036e6bc56386b/Fireeye_Mandiant_Malware_Analysis_Course.part09.rar.html
rapidgator.net/file/df71ccb0167ea40168ed18486dd900fc/Fireeye_Mandiant_Malware_Analysis_Course.part10.rar.html
rapidgator.net/file/c1707860c51b58e8bc3e9f7753364313/Fireeye_Mandiant_Malware_Analysis_Course.part11.rar.html
rapidgator.net/file/518ebb134e2fa54441add482f0ecc66e/Fireeye_Mandiant_Malware_Analysis_Course.part12.rar.html
rapidgator.net/file/a79d58515e0366c71477210fc6b4ba9e/Fireeye_Mandiant_Malware_Analysis_Course.part13.rar.html
rapidgator.net/file/52630ef25326fda5d0f1df05eecee4ab/Fireeye_Mandiant_Malware_Analysis_Course.part14.rar.html
rapidgator.net/file/0cc5b34e037eb02fe81c9558f6255205/Fireeye_Mandiant_Malware_Analysis_Course.part15.rar.html
NITROFLARE
nitroflare.com/view/A3FBFDCFC12A365/Fireeye_Mandiant_Malware_Analysis_Course.part01.rar
nitroflare.com/view/75F3DD075E73D8E/Fireeye_Mandiant_Malware_Analysis_Course.part02.rar
nitroflare.com/view/F07AB7C24CD2EBF/Fireeye_Mandiant_Malware_Analysis_Course.part03.rar
nitroflare.com/view/3672F9FE2D198C7/Fireeye_Mandiant_Malware_Analysis_Course.part04.rar
nitroflare.com/view/18CED38EA7BAEC0/Fireeye_Mandiant_Malware_Analysis_Course.part05.rar
nitroflare.com/view/C9C73F338E33AFB/Fireeye_Mandiant_Malware_Analysis_Course.part06.rar
nitroflare.com/view/0DA0FDF2ADE4AA3/Fireeye_Mandiant_Malware_Analysis_Course.part07.rar
nitroflare.com/view/64721418F5C84C2/Fireeye_Mandiant_Malware_Analysis_Course.part08.rar
nitroflare.com/view/3FFBC7772E75747/Fireeye_Mandiant_Malware_Analysis_Course.part09.rar
nitroflare.com/view/C77F968BE56EE60/Fireeye_Mandiant_Malware_Analysis_Course.part10.rar
nitroflare.com/view/DC3D09F9015E431/Fireeye_Mandiant_Malware_Analysis_Course.part11.rar
nitroflare.com/view/0415A1A5F3009AB/Fireeye_Mandiant_Malware_Analysis_Course.part12.rar
nitroflare.com/view/8B8BF44D4E5D355/Fireeye_Mandiant_Malware_Analysis_Course.part13.rar
nitroflare.com/view/87AA768E7AADCAB/Fireeye_Mandiant_Malware_Analysis_Course.part14.rar
nitroflare.com/view/8153EA1A5B04B14/Fireeye_Mandiant_Malware_Analysis_Course.part15.rar