Pluralsight - Advanced Malware Analysis - Combating Exploit Kits
File List
- Files/malware-advanced-analysis-combating-exploit-kits.zip 347.7 MB
- 11.Reversing Malware with IDA pro/1102.Reversing Demo.mp4 28.0 MB
- 10.Reversing Malware with Debugging Tools/1002.Demo Extract Malware with IDA Debugger.mp4 27.2 MB
- 02.Introduction/0202.Demo Analyzing a Bromium Alert.mp4 22.4 MB
- 03.Recognizing the Exploit Vector/0302.How to Find the Exploit in a Malware Attack.mp4 16.9 MB
- 09.Analyzing Files Statically/0902.Demo How to Use the tools.mp4 15.3 MB
- 04.Unraveling Exploit Obfuscation/0402.Continued Deobfuscation.mp4 15.0 MB
- 10.Reversing Malware with Debugging Tools/1004.Debug Details and Assignment.mp4 14.6 MB
- 03.Recognizing the Exploit Vector/0303.Exploit Finding Demo.mp4 14.3 MB
- 10.Reversing Malware with Debugging Tools/1003.More on how to Choose an Approach.mp4 11.8 MB
- 04.Unraveling Exploit Obfuscation/0403.Deobfuscation Demo.mp4 11.3 MB
- 12.Customizing Reports From Researchers to CISOs/1202.How to Report Treat Data.mp4 11.1 MB
- 08.Performing Safe Dynamic Analysis/0803.Dynamic Analysis Walk-through.mp4 8.8 MB
- 11.Reversing Malware with IDA pro/1104.Reversing Details and Assignment.mp4 8.5 MB
- 04.Unraveling Exploit Obfuscation/0401.Intro and Why to Script.mp4 8.4 MB
- 11.Reversing Malware with IDA pro/1103.Goals and Cyclic Recap.mp4 8.4 MB
- 09.Analyzing Files Statically/0901.File Analysis Tools and Techniques.mp4 7.0 MB
- 06.Understanding Moving Target Communications/0602.DGAs and More.mp4 6.9 MB
- 09.Analyzing Files Statically/0903.More Tool Details.mp4 6.8 MB
- 02.Introduction/0203.Security Tool Follow-up.mp4 6.5 MB
- 05.Circumventing Exploit Kit Encryption/0503.Deobfuscation 2.mp4 6.5 MB
- 03.Recognizing the Exploit Vector/0301.Recognizing Exploit Vector Intro.mp4 5.5 MB
- 07.Detecting Angler in the Wild/0704.YARA Examples and Lab.mp4 5.3 MB
- 08.Performing Safe Dynamic Analysis/0802.Another Sample.mp4 5.2 MB
- 05.Circumventing Exploit Kit Encryption/0502.Exploit Kit Details.mp4 5.0 MB
- 08.Performing Safe Dynamic Analysis/0801.Malware Analysis Goals.mp4 4.0 MB
- 07.Detecting Angler in the Wild/0703.YARA.mp4 3.9 MB
- 05.Circumventing Exploit Kit Encryption/0501.Module Overview and Homework Review.mp4 3.2 MB
- 01.Course Overview/0101.Course Overview.mp4 3.2 MB
- 07.Detecting Angler in the Wild/0702.Malware Detection.mp4 3.1 MB
- 06.Understanding Moving Target Communications/0601.Module Goals and Assignment Review.mp4 3.1 MB
- 06.Understanding Moving Target Communications/0603.Non-DGA EKs.mp4 3.1 MB
- 12.Customizing Reports From Researchers to CISOs/1201.Intro and Recap.mp4 2.0 MB
- 07.Detecting Angler in the Wild/0701.How to Find More Samples.mp4 2.0 MB
- 02.Introduction/0201.Introduction to Malware.mp4 1.7 MB
- 06.Understanding Moving Target Communications/0604.Begining EK Detection Lab.mp4 1.6 MB
- 09.Analyzing Files Statically/0904.Assignment Run and Report.mp4 1.4 MB
- 08.Performing Safe Dynamic Analysis/0804.Sandbox Assignment.mp4 1.2 MB
- 10.Reversing Malware with Debugging Tools/1001.Static or Dynamic Analysis.mp4 901.9 KB
- 11.Reversing Malware with IDA pro/1101.Demo and Lesson Plan.mp4 885.4 KB
- 02.Introduction/0204.First Malware Analysis Lab.mp4 658.8 KB
- 05.Circumventing Exploit Kit Encryption/0504.Deobfuscation Lab 2.mp4 604.3 KB
- 04.Unraveling Exploit Obfuscation/0404.Deobfuscation Lab 1.mp4 590.5 KB
- 12.Customizing Reports From Researchers to CISOs/1203.Summary and Assignment.mp4 485.5 KB
- 03.Recognizing the Exploit Vector/0304.Exploit Finding Lab 1.mp4 279.6 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.