Hunting for Fileless Malware

In this course, you’ll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.
Course info
Rating
(21)
Level
Intermediate
Updated
Dec 18, 2018
Duration
1h 41m
Table of contents
Description
Course info
Rating
(21)
Level
Intermediate
Updated
Dec 18, 2018
Duration
1h 41m
Description

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it.

About the author
About the author

Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!

More from the author
Setting Up a Malware Analysis Lab
Intermediate
1h 26m
Nov 21, 2019
Malware Analysis and Detection: Trickbot
Intermediate
1h 30m
Nov 15, 2019
More courses by Tyler Hudak
About the author

Aaron M. Rosenmund is a cyber security operations and incident response subject matter expert, with a background in federal and business system administration, virtualization and automation.

More from the author
Setting Up a Malware Analysis Lab
Intermediate
1h 26m
Nov 21, 2019
Malware Analysis and Detection: Trickbot
Intermediate
1h 30m
Nov 15, 2019
More courses by Aaron Rosenmund
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone, I'm Aaron Rosenmund, a full-time cyber security author for Pluralsight, focused on security operations and incident response and a part-time member of the Florida International Guard where I focus on the development and implementation of defensive cyber operations. As a cyber operations specialist, you're always looking for the next evolution of threat that will test your defenses or cleverly hide from your instant response procedures. And in this course, I'm especially interested in the onset of fileless malware and have teamed up with a fellow author, Tyler Hudak, to gain some insight in this area. This is Tyler Hudak. I do incident response as my primary job and am a Pluralsight author. With my job, I get to see a number of different techniques that attackers are using to compromise organizations all over the world. One of the things I've seen being used more and more are fileless attacks. Because of this, it has become necessary for security analysts and organizations to understand these attacks, and more importantly, how to detect them. We are going to cover the reality of the term fileless; why it has become a popular method for exploitation of attackers; as well as the policies, settings, logs, and tools used to detect this behavior. By the end of this course, you will know what fileless malware is, what some of these attacks look like, and what you and your organization needs to do in order to detect these attacks. I hope you will join us in this Play by Play to learn more about fileless malware behavior and detection with Hunting Fileless Malware, at Pluralsight.