Learn from examples about how polymorphism would work in real life
Video

Learn from examples about how polymorphism would work in real life

Packt
Updated Sep 26, 2019

Course Overview

In this video course, we start with the basic concepts of malware and you’ll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, you’ll see how to set up your own lab to make a secure environment for malware analysis. Moving on, you’ll get familiar with the basic techniques of static and dynamic malware analysis and gets your hands dirty with debuggers and disassemblers such as OllyDbg and IDA PRO. You’ll learn how to analyze malware and understand its anatomy using these tools and techniques. Finally, you’ll be exposed to the techniques that malware may use to evade detection and remain undetected. By the end of the course, you’ll have a solid knowledge that will enable you to analyze the majority of malware programs.


Target Audience

This video course provides Security Professionals, Incident Responders, and individuals with the information they need to perform deep malware analysis. You’ll also gain knowledge ofhow to detect malware and defend against it.

This video is part of the course Fundamentals of Malware Analysis

The last video of this section aims to put everything learnt together and give an understanding of a few other strategies not covered initially in malware remaining stealthy.

  • Learn about various strategies not discussed before that would still be used to evade detection
  • Learn through examples how the anti-detection strategies work and view detection rates
  • Perform a section recap to glue together everything learnt in this unit of malware evasion techniques
;