Advanced Malware Analysis: Combating Exploit Kits

Cyber-crime is rampant, and it's only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.
Course info
Rating
(37)
Level
Advanced
Updated
Jun 9, 2016
Duration
2h 23m
Table of contents
Course Overview
Introduction
Recognizing the Exploit Vector
Unraveling Exploit Obfuscation
Circumventing Exploit Kit Encryption
Understanding Moving Target Communications
Detecting Angler in the Wild
Performing Safe Dynamic Analysis
Analyzing Files Statically
Reversing Malware with Debugging Tools
Reversing Malware with IDA pro
Customizing Reports: From Researchers to CISOs
Description
Course info
Rating
(37)
Level
Advanced
Updated
Jun 9, 2016
Duration
2h 23m
Description

Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you'll explore the tools and techniques you'll be using as well as analyze events collected by Bromium micro-VMs. Next, you'll work on unraveling the exploit kits--figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in "the wild." Finally, you'll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you'll not only have a better understanding of what exploit kits are and how to detect them, but you'll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime.

About the author
About the author

Dr. Jared DeMott is the founder of the security company, Vulnerability Discovery & Analysis (VDA) Labs. DeMott is a former NSA security analyst, Microsoft BlueHat Prize winner, and was the CTO and Binary Defense. He's frequently quoted in media, and invited to speak at security events.

More from the author
Security for Hackers and Developers: Fuzzing
Intermediate
2h 9m
Dec 14, 2016
More courses by Dr. Jared DeMott
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone, my name is Dr. DeMott, and welcome to my course, Advanced Malware Analysis: Combating Exploit Kits. I'm the CTO at Binary Defense Systems and have been a longtime security researcher, malware and vulnerability expert. Mentoring is also a core part of what I enjoy. Did you know that cybercrime is a multi-billion dollar industry? It's easy for the good guys to fall behind because of the flood in new attacks. In this course, we're going to turn the tide as I explain the details of how these threats operate. Some of the major topics that we will cover include using next-generation security tools, understanding exploit kits, reverse engineering ransomware, extracting malicious document internals. By the end of this course, you'll know how to defeat or at least dissect the latest threats. Before beginning the course, you should be at least somewhat familiar with security, malware, and exploit basics. After completing this training, you should feel comfortable diving into other security courses like exploit development, reverse engineering, incident response, penetration testing, and more. I hope you'll join me on this journey toward stopping cybercrime with the Advanced Malware Analysis: Combating Exploit Kits course, only at Pluralsight.