In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it.
Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!
Course Overview Hello everyone, I'm Aaron Rosenmund, a full-time cyber security author for Pluralsight, focused on security operations and incident response and a part-time member of the Florida International Guard where I focus on the development and implementation of defensive cyber operations. As a cyber operations specialist, you're always looking for the next evolution of threat that will test your defenses or cleverly hide from your instant response procedures. And in this course, I'm especially interested in the onset of fileless malware and have teamed up with a fellow author, Tyler Hudak, to gain some insight in this area. This is Tyler Hudak. I do incident response as my primary job and am a Pluralsight author. With my job, I get to see a number of different techniques that attackers are using to compromise organizations all over the world. One of the things I've seen being used more and more are fileless attacks. Because of this, it has become necessary for security analysts and organizations to understand these attacks, and more importantly, how to detect them. We are going to cover the reality of the term fileless; why it has become a popular method for exploitation of attackers; as well as the policies, settings, logs, and tools used to detect this behavior. By the end of this course, you will know what fileless malware is, what some of these attacks look like, and what you and your organization needs to do in order to detect these attacks. I hope you will join us in this Play by Play to learn more about fileless malware behavior and detection with Hunting Fileless Malware, at Pluralsight.