Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Malware Analysis: Initial Access Techniques

Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise.

Intermediate
1h 40m
(12)

Created by Josh Stroschein

Last Updated Nov 10, 2023

Course Thumbnail
  • Course

Malware Analysis: Initial Access Techniques

Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise.

Intermediate
1h 40m
(12)

Created by Josh Stroschein

Last Updated Nov 10, 2023

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Malware is distributed through a wide variety of complex channels, utilizing obfuscation and subterfuge to avoid detection. In this course, Malware Analysis: Initial Access Techniques, you’ll learn the skills necessary to identify these stages and get hands-on with the tools to unravel them to extract key indicators of compromise. First, you’ll explore how malware is delivered, identifying commonly abused technologies, and learn about critical mitigations. Next, you’ll get hands-on exploring malicious infrastructure to understand how threat actors can proactively compromise your organization. You will also see how malware command and control works and techniques for identifying this type of communication. Finally, you’ll dive deep into performing malware analysis on a variety of initial access artifacts, such as office documents and PowerShell scripts. When you’re finished with this course, you’ll have the skills and knowledge of initial access techniques to continue your journey to become a seasoned malware analyst.

Malware Analysis: Initial Access Techniques
Intermediate
1h 40m
(12)
Table of contents

About the author
Josh Stroschein - Pluralsight course - Malware Analysis: Initial Access Techniques
Josh Stroschein
19 courses 4.7 author rating 376 ratings

Dr. Josh Stroschein is an Assistant Professor at Dakota State University where he teaches malware analysis, software exploitation, reverse engineering, and penetration testing. Josh also works as a malware analyst for Bromium, an end-point security company and is the Director of Training for the Open Information Security Foundation (OISF).

Get started with Pluralsight