Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

OT Malware Analysis: FrostyGoop

This course will teach the basics of analyzing GoLang binaries and how to identify OT-specific threats using the FrostyGoop malware.

Josh Stroschein - Pluralsight course - OT Malware Analysis: FrostyGoop
by Josh Stroschein

What you'll learn

Operational technology (OT) is at the core of critical infrastructure, and understanding how threat actors exploit it is essential for protecting these vital systems. Operational technology is what powers critical infrastructure all over the world and becomes a valuable target for threat actors to abuse. In this course, OT Malware Analysis: FrostyGoop, you’ll learn how to analyze malicious files to identify OT-specific threats. First, you’ll explore the nexus between OT systems and malware. Next, you’ll get hands-on analyzing the OT malware FrostyGoop to learn how threat actors can abuse OT protocols. Finally, you’ll use dynamic analysis to capture malware behavior and identify OT attack patterns. When you’re finished with this course, you’ll have the skills and knowledge of OT systems needed to identify malware targeting these systems.

Table of contents

About the author

Josh Stroschein - Pluralsight course - OT Malware Analysis: FrostyGoop
Josh Stroschein

Dr. Josh Stroschein is an Assistant Professor at Dakota State University where he teaches malware analysis, software exploitation, reverse engineering, and penetration testing. Josh also works as a malware analyst for Bromium, an end-point security company and is the Director of Training for the Open Information Security Foundation (OISF).

More Courses by Josh