There are many ways that malware tries to duck detection or make itself difficult to analyze. In this course, eight videos reintroduce you to malware and its various disguises: obfuscation, encoding and encryption. Beginning with simple obfuscation techniques such as assigning junk values and running comparisons then ignoring set flags, you’ll get a closer look at advanced obfuscation, simple and complex ciphers, common crypto-algorithms, ransomware and the decoding process needed to combat these tricks. Everything from Caesar ciphers to crypto-libraries.
Obfuscation DefinitionDuration: 6:12
Simple Obfuscation TechniquesDuration: 2:37
Advanced Obfuscation TechniquesDuration: 10:34
Simple Ciphers and Encoding SchemesDuration: 7:47
Common Crypto AlgorithmsDuration: 2:19
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."