Description
Size: 1.88 GB
Course Syllabus
- Technical overview of injection techniques and persistence mechanisms
- Discovering/recognizing privilege escalation in malware
- Threat actors techniques to gain a foothold on networks
- Deep dive into APTs (advanced persistent threats), eCrime
- Info-stealers and Exploit Kit drive-bys seen in the wild
- Analyzing shellcode usage in malware
- Full analysis of malware techniques – stealth, persistence, algorithms, communication to a C2 server, and advanced capabilities