- Course
Getting Started Analyzing Malware Infections
Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise.
- Course
Getting Started Analyzing Malware Infections
Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you'll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you're finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company.
Getting Started Analyzing Malware Infections
-
Problem Statement | 3m 27s
-
Understanding Phishing Tactics | 3m 43s
-
Indicators of Compromise | 2m 59s
-
Analyzing a Suspicious Mail | 3m 51s
-
Setting up an Analysis Environment | 2m 38s
-
Analyzing Malware Off Network | 2m 33s
-
Snapshotting | 2m 6s
-
Safe Handling Procedures | 2m 55s
-
Safe Handling in Practice | 4m 20s
-
Summary | 1m 10s