Any hunter knows that you need to watch your target before you pounce. This fifteen-video course on common malware behaviors will help make an engineer an even better malware hunter: beginning with downloaders and backdoors, you’ll look at process replacement, registry persistence, Trojanized system binaries, network functions and five different types of injection. Explore not just the whats but the whys with an important module on the goals of network analysis, and get comfortable with malware types such as RATs, Trojans, credential stealers, keyloggers and more.
Downloaders and BackdoorsDuration: 8:37
Credential StealersDuration: 8:06
Process InjectionDuration: 2:26
DLL InjectionDuration: 3:18
Direct InjectionDuration: 1:31
Process ReplacementDuration: 1:39
Hook InjectionDuration: 4:12
APC InjectionDuration: 1:49
Registry PersistenceDuration: 4:16
Trojanized System BinariesDuration: 2:52
DLL Load Order HijackingDuration: 2:41
Goals of Network AnalysisDuration: 2:55
Network FunctionsDuration: 3:03
IP Addresses Protocols and PortsDuration: 5:11
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company.
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."
"I’ve taken five boot camps with Infosec and all my instructors have been great."