We may earn an affiliate commission when you visit our partners.
Tyler Hudak and Aaron Rosenmund

In this course, you’ll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.

Read more

In this course, you’ll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
What Is Fileless Malware?
How Does Fileless Malware Work?
Why Do Attackers Use These Techniques?
Read more
Defenses Against Fileless Malware: Employing Proper Logging
Defenses Against Fileless Malware: Utilizing Hunting Tools
Conclusion

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops fileless malware detection and defense skills, which are highly relevant to network security professionals
Explores fileless malware techniques, which are used by attackers to bypass traditional security measures
Employs native tools, such as PowerShell and WMI, which are commonly used in fileless malware attacks
Provides strategies for defending against fileless malware, which can be applied by security professionals to protect their organizations
Taught by Tyler Hudak and Aaron Rosenmund, who are both experienced security researchers and practitioners with deep expertise in fileless malware detection and defense
Focuses on practical skills and knowledge, which can be immediately applied by security professionals to improve their abilities in detecting and defending against fileless malware

Save this course

Save Fileless Malware to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Fileless Malware with these activities:
Review Logging Techniques for Fileless Malware Detection
Strengthen your understanding of logging techniques and their importance in detecting fileless malware by revisiting core concepts and reviewing best practices.
Show steps
  • Review different types of logs and their significance for fileless malware detection.
  • Configure and manage Windows Event logs for optimal monitoring.
  • Use tools to parse and analyze event logs for suspicious activity.
Review and Organize Course Content
Enhance comprehension by organizing and summarizing lecture notes, assignments, and quizzes.
Browse courses on Fileless Malware
Show steps
  • Gather all relevant course materials
  • Organize materials into logical groups
  • Summarize key concepts and examples
Learn about the SysInternals suite of tools
Mastering SysInternals is indispensable for hunting fileless malware. Familiarize yourself with the key concepts and how to use its tools.
Show steps
  • Review SysInternals documentation and tutorials
  • Use Process Explorer to analyze processes and memory
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow a course on hunting fileless malware
Enroll in a guided course or workshop to gain structured knowledge and practical skills in hunting fileless malware.
Show steps
  • Choose a reputable course provider
  • Follow the course content and complete assignments
  • Ask questions and interact with instructors and other students
Attend industry conferences and meetups
Interact with cybersecurity professionals, learn about the latest trends, and expand your network.
Show steps
  • Find relevant conferences and meetups in your area or online
  • Register and attend the events
  • Network with attendees and speakers
Analyze fileless malware samples
Analyze real-world fileless malware samples to gain hands-on experience identifying and understanding their behavior.
Show steps
  • Obtain fileless malware samples from reputable sources
  • Use sandboxes or virtual machines for safe analysis
  • Use tools like Process Monitor and SysMon to track system calls and processes
Contribute to Open Source Fileless Malware Detection Projects
Gain practical experience and contribute to the community by participating in open source fileless malware detection projects.
Browse courses on Open Source Security
Show steps
  • Identify suitable open source projects
  • Review the codebase and documentation
  • Identify areas for contribution

Career center

Learners who complete Fileless Malware will develop knowledge and skills that may be useful to these careers:
Security Operations Manager
Security Operations Managers oversee the day-to-day operations of security teams. They work with security teams to develop and implement security measures, and they monitor networks for suspicious activity. A solid understanding of fileless malware techniques is essential for Security Operations Managers, as they need to be able to manage the response to these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. They work to contain the damage caused by an incident and restore normal operations as quickly as possible. A deep understanding of fileless malware techniques is essential for Incident Responders, as they need to be able to quickly identify and neutralize these types of attacks. This course provides a hands-on overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Malware Analyst
Malware Analysts investigate and analyze malware to understand how it works and how to protect against it. They work with security teams to develop and implement security measures to prevent malware infections. A strong understanding of fileless malware techniques is essential for Malware Analysts, as they need to be able to detect and analyze these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Security Architect
Security Architects design and implement security solutions to protect organizations from cyberattacks. They work with security teams to develop and implement security policies and procedures. A solid understanding of fileless malware techniques is essential for Security Architects, as they need to be able to design and implement solutions to protect against these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Security Researcher
Security Researchers investigate and analyze security vulnerabilities to develop new ways to protect against them. They work with security teams to develop and implement security measures to prevent vulnerabilities from being exploited. A deep understanding of fileless malware techniques is essential for Security Researchers, as they need to be able to identify and analyze these types of vulnerabilities. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. They develop security policies and procedures, conduct risk assessments, and monitor networks for suspicious activity. An understanding of fileless malware techniques is crucial for Information Security Analysts, as they need to be able to detect and prevent these types of attacks. This course provides a solid foundation in fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Security Engineer
Security Engineers design, implement, and manage security systems. They work to protect organizations from unauthorized access, intrusions, and other threats. A strong understanding of fileless malware techniques is essential for Security Engineers, as they need to be able to design and implement solutions to protect against these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Cybersecurity Analyst
Cybersecurity Analysts use their knowledge of computer systems and networks to protect organizations from cyberattacks. They monitor networks for suspicious activity, investigate security breaches, and develop security plans and procedures. A strong understanding of fileless malware techniques is essential for Cybersecurity Analysts, as they need to be able to detect and prevent these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Network Security Engineer
Network Security Engineers design, implement, and manage network security systems. They work to protect networks from unauthorized access, intrusions, and other threats. A deep understanding of fileless malware techniques is essential for Network Security Engineers, as they need to be able to protect networks from these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Security Consultant
Security Consultants provide security advice and services to organizations. They work with organizations to assess their security risks, develop security plans, and implement security measures. A deep understanding of fileless malware techniques is essential for Security Consultants, as they need to be able to advise organizations on how to protect against these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Risk Analyst
Risk Analysts assess the risks facing an organization and develop strategies to mitigate those risks. They work with organizations to identify and prioritize risks, and they develop and implement risk management plans. A deep understanding of fileless malware techniques is essential for Risk Analysts, as they need to be able to assess the risks posed by these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Compliance Manager
Compliance Managers oversee an organization's compliance with laws and regulations. They work with organizations to develop and implement compliance programs, and they monitor compliance with those programs. A solid understanding of fileless malware techniques is essential for Compliance Managers, as they need to be able to protect organizations from legal liability caused by these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Privacy Analyst
Privacy Analysts help organizations to protect the privacy of their customers and employees. They work with organizations to develop and implement privacy policies and procedures, and they investigate privacy breaches. A solid understanding of fileless malware techniques is essential for Privacy Analysts, as they need to be able to protect organizations from privacy breaches caused by these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Data Protection Officer
Data Protection Officers (DPOs) are responsible for overseeing an organization's compliance with data protection regulations. They work with organizations to develop and implement data protection policies and procedures. A strong understanding of fileless malware techniques is essential for DPOs, as they need to be able to protect organizations from data breaches caused by these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and manage cybersecurity systems. They work to protect networks from unauthorized access, intrusions, and other threats. A strong understanding of fileless malware techniques is essential for Cybersecurity Engineers, as they need to be able to develop and implement solutions to protect against these types of attacks. This course provides a comprehensive overview of fileless malware, including the different types of techniques used by attackers and the defenses that can be implemented to protect against them.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Fileless Malware.
Provides a comprehensive overview of memory forensics, covering topics such as the history of memory forensics, the different types of memory forensics, and the techniques used to investigate and analyze memory.
Comprehensive overview of malware forensics, covering topics such as the history of malware, the different types of malware, and the techniques used to investigate and analyze malware.
Will help you in understanding malware analysis techniques, in learning to think like a malware analyst, and in getting practical experience analyzing real-world malware.
Will help you in understanding the use of machine learning in malware analysis, in understanding the current AI mechanisms used in threat detection, and in gaining an understanding of the tools and techniques used in malware analysis.
Provides a comprehensive guide to ethical hacking, covering topics such as penetration testing, vulnerability assessment, and social engineering.
Provides a detailed overview of malware forensics, covering topics such as how to collect evidence, how to analyze malware, and how to write malware reports.
Provides a comprehensive guide to memory forensics, covering topics such as how to collect memory samples, how to analyze memory dumps, and how to identify malicious activity in memory.
Provides a comprehensive guide to rootkits, covering topics such as how rootkits work, how to detect rootkits, and how to remove rootkits.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Fileless Malware.
Malware Analysis and Assembly Language Introduction
Most relevant
Trickbot Banking Trojan
Most relevant
Malware Analysis and Introduction to Assembly Language
Most relevant
Ethical Hacking: Vulnerability Analysis
Common Vulnerabilities and Exploits with Python
API Security with the OWASP API Security Top 10
Secure Coding: Preventing Broken Access Control
Cyber Criminals and Their Attacks
Aruba Network Security Basics
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser