Cyber-crime is rampant, and it's only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.
Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you'll explore the tools and techniques you'll be using as well as analyze events collected by Bromium micro-VMs. Next, you'll work on unraveling the exploit kits--figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in "the wild." Finally, you'll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you'll not only have a better understanding of what exploit kits are and how to detect them, but you'll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime.
Dr. Jared DeMott is the founder of the security company, Vulnerability Discovery & Analysis (VDA) Labs. DeMott is a former NSA security analyst, Microsoft BlueHat Prize winner, and was the CTO and Binary Defense. He's frequently quoted in media, and invited to speak at security events.
Course Overview Hello everyone, my name is Dr. DeMott, and welcome to my course, Advanced Malware Analysis: Combating Exploit Kits. I'm the CTO at Binary Defense Systems and have been a longtime security researcher, malware and vulnerability expert. Mentoring is also a core part of what I enjoy. Did you know that cybercrime is a multi-billion dollar industry? It's easy for the good guys to fall behind because of the flood in new attacks. In this course, we're going to turn the tide as I explain the details of how these threats operate. Some of the major topics that we will cover include using next-generation security tools, understanding exploit kits, reverse engineering ransomware, extracting malicious document internals. By the end of this course, you'll know how to defeat or at least dissect the latest threats. Before beginning the course, you should be at least somewhat familiar with security, malware, and exploit basics. After completing this training, you should feel comfortable diving into other security courses like exploit development, reverse engineering, incident response, penetration testing, and more. I hope you'll join me on this journey toward stopping cybercrime with the Advanced Malware Analysis: Combating Exploit Kits course, only at Pluralsight.