Malware Analysis: The Big Picture
Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
What you'll learn
Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you'll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you're finished with this course, you'll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment.
Table of contents
- Intro 1m
- Who Should Watch This? 3m
- What Is Malware? 3m
- Why Should You Care? 3m
- How Do Systems Get Infected? 5m
- Major Forms of Malware 2m
- Viruses 1m
- Worms 1m
- Trojans Horse Programs 1m
- Malicious Mobile Code and Blended Attacks 1m
- Attacker Tools 2m
- Timeline of Noteworthy Malware Outbreaks 4m
- Goals of Malware Analysis and Module Review 3m
- Module Introduction 1m
- Cost of Malware Infections 2m
- Incident Prevention 3m
- Preparation and Communication 2m
- Malware Incident Handling Best Practices and Layered Defense 3m
- Anti-virus Software 2m
- End-point Protection Tools 4m
- Identification and Documentation 3m
- Intrusion Prevention Systems 1m
- Best Practices Around Virtualization and Application Whitelisting 4m
- Virtualization and Snapshots 3m
- Goals of Malware Analysis Overview 3m
- Manual vs. Automatic Malware Detection 3m
- Malware Analysis Tools 2m
- Malware Analysis Lab 1m
- Recovery After an Infection 3m
- NIST Special Publications Around Computer Security 2m
- Module Intro & Importance of a Properly Trained Response Team 3m
- Phases of Incident Response 2m
- Preparation 2m
- Detection and Analysis 3m
- Stopping the Spread of Malware, Eradication and Recovery 3m
- Benefits of Proper Malware Analysis 3m
- Indicators of Compromise (IOC) 2m
- Malware Analysis Techniques 3m
- Domain Generation Algorithm (DGA) 2m
- Types of Malware Analysis 3m
- Malware Analysis Tools 3m
- Virtual Lab for Malware Analysis 3m
- Module Review 1m
- Module Intro 1m
- Acquiring Evidence During a Malware Investigation 2m
- Questions to Consider 3m
- Types of Companies 1m
- Golden Hour Decisions 3m
- Digital Forensics and Incident Response 3m
- Digital Evidence 3m
- NIST SP 800-86 1m
- Handling the Press 2m
- Company Board and Their Main Goals 1m
- What's Important to the Board 5m
- Module and Course Review 4m