Forensic Investigator (Part 6 of 10): Malware Forensics
Interactive

Forensic Investigator (Part 6 of 10): Malware Forensics

Biz Library
Updated Feb 04, 2020

When was the last time you scanned your system for problems? Did you find anything during a scan? Malware is a serious problem for end systems and networks in general. We are going to look at malware types like rootkits, viruses and Trojans and how we might become compromised. Once we find the malicious software, we as investigators need to know how to analyze the data. We have to ask ourselves are we doing a static or dynamic analysis on the malware. Static versus dynamic, or maybe both, will be a necessary part of our investigation. This course contains the following lessons:


Lesson 1:

  • Malware Forensics
  • Malware Parts
  • Malware, Virus
  • Malware, Trojan
  • Malware, Worm
  • Malware, Rootkit
  • Malware, Ransomware.

Lesson 2:

  • Malware Analysis
  • Other Malware Analysis Tools
  • Static Analysis
  • Static Analysis Techniques
  • Statistical Analysis Techniques, Continued.

Lesson 3:

  • Dynamic Analysis
  • Dynamic Analysis Techniques, Registry Monitors
  • Registry Monitoring
  • Dynamic Analysis Techniques, Process Monitors
  • Dynamic Analysis Techniques, Port Monitors
  • Dynamic Analysis Techniques, Network Sniffers
  • Wireshark
  • Dynamic Analysis Techniques, Mo
  • Network or Internet Simulators.