Tag: Malicious

Performing Malware Analysis on Malicious Documents

Tyler Hudak | Duration: 2:59 h | Video: H264 1280×720 | Audio: AAC 44,1 kHz 2ch | 456 MB | Language: English
Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain.
Hiding malware within documents has become one the main methods attackers use to compromise systems. In this course, Performing Malware Analysis on Malicious Documents, you will learn how to look at documents to determine if they contain malware, and if so, what that malware does. First, you will explore how to analyze malicious Adobe PDF and Microsoft Office documents. Next, you will discover how attackers obfuscate scripts within malicious documents, and how you can defeat that obfuscation to determine the script’s purpose. Finally, you will dive into the tools required to perform this analysis safely and quickly. When you’re finished with this course, you will have the skills and knowledge needed to perform malware analysis on malicious documents.
Homepage

https://www.pluralsight.com/courses/malware-analysis-malicious-documents-performing

(more…)

Snort 3 QuickStart Pro Detect malicious network activity, scan packets, generate alerts


Free Download Snort 3 QuickStart Pro: Detect malicious network activity, scan packets, generate alerts
English | 2024 | ISBN: 8197416532 | 178 Pages | PDF EPUB | 0.8 MB
To help cybersecurity, networking, and information technology professionals learn Snort 3 fast, we’ve created the Snort 3 QuickStart Pro. This book offers practical insights into deploying and managing Snort in a variety of network environments, enabling you to effectively use Snort’s powerful intrusion detection and prevention features.

(more…)

Malware Analysis – Malicious Activity Detection


Free Download Malware Analysis – Malicious Activity Detection
Released 1/2024
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English | Duration: 1h 47m | Size: 2.1 GB
Threat actors are constantly changing their tactics and evolving their tools. This course will teach you how to create custom detections to detect and prevent emerging threats in your organization

(more…)