Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise.
Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you'll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you're finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company.
Cristian is a Information Security Professional with experience in supply chain, manufacturing, gaming, and
entertainment sectors for Fortune 500 companies. He has provided expertise in incident response cases by
performing forensic investigations, malware analysis, and elaborating mitigation plans against
complex cyber attacks.
Course Overview Hi everyone, my name is Christian Pascariu, and welcome to my course, Getting Started Analyzing Malware Infections. I am an information security professional. Over the years, I have gained some valuable experience in the field of malware analysis, incident response, and forensics that I want to share with you. Until a while ago, we thought of computer viruses as malicious toolbars. Nowadays we are seeing some advanced malware that can encrypt data and demand ransom in return. The main reason behind this course is to share with you a structured approach that you can make use of in tackling a wide variety of malware types that is guaranteed to generate some actionable results. In this course, we are going to analyze computer viruses over multiple scenarios to develop better, more effective endpoint and network defenses. Some of the major topics that we will cover include generic malware behavior and indicators of malicious activity, common delivery tactics that leverage phishing emails, we will dissect infected documents to uncover hidden malware components, we will perform static and dynamic analysis and also monitor malicious network activity. By the end of this course, you'll know the right techniques for investigating malicious infections based on their type, and use the right tools in the analysis process. Before beginning this course, you should be familiar with basic security concepts. I hope you will join me on this journey to learn malware analysis with the Getting Started Analyzing Malware Infections course at Pluralsight.