We may earn an affiliate commission when you visit our partners.
Course image
Jared DeMott and Dr. Jared DeMott
Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you'll explore the tools and techniques you'll be using as well as analyze events collected by Bromium micro-VMs. Next, you'll work on unraveling the exploit kits--figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in "the...
Read more
Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you'll explore the tools and techniques you'll be using as well as analyze events collected by Bromium micro-VMs. Next, you'll work on unraveling the exploit kits--figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in "the wild." Finally, you'll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you'll not only have a better understanding of what exploit kits are and how to detect them, but you'll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
It focuses on a specific and timely problem: advanced malware analysis and combatting exploit kits
Hands-on analysis of malware and exploit kits through safe dynamic analysis
Led by Dr. Jared DeMott, a recognized expert in cyber security, malware analysis, and digital forensics
Covers essential techniques and tools for combating advanced malware
Suitable for professionals seeking to strengthen their skills in malware analysis and cyber security
May require prior knowledge in cyber security and malware analysis concepts

Save this course

Save Advanced Malware Analysis: Combating Exploit Kits to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Advanced Malware Analysis: Combating Exploit Kits. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Advanced Malware Analysis: Combating Exploit Kits will develop knowledge and skills that may be useful to these careers:
Malware Analyst
Malware Analysts use tools and techniques to analyze exploit kits and other types of malicious software. This course provides the tools and skills needed to become a Malware Analyst, including how to detect exploit kits and report them.
Security Architect
Security Architects use their knowledge of exploit kits and the skills taught in this course to protect IT systems, networks, and applications.
Chief Information Security Officer
Chief Information Security Officers can use the skills and knowledge taught in this course to protect their organization from exploit kits.
Information Security Analyst
Information Security Analysts can use the techniques taught in this course to detect, prevent, and patch security vulnerabilities.
Security Consultant
Security Consultants help companies and organizations protect their IT systems from exploit kits and other threats. This course teaches you how to analyze exploit kits and provides tools you can use to consult on.
Information Technology Auditor
Information Technology Auditors may use the skills taught in this course to detect, prevent, and patch security vulnerabilities.
Vulnerability Researcher
Vulnerability Researchers can use the techniques taught in this course to help detect, prevent, and patch security vulnerabilities.
Computer Forensic Analyst
Computer Forensic Analysts may use the skills taught in this course to analyze exploit kits and other types of malicious software involved in cybercrimes.
Cybersecurity Analyst
Cybersecurity Analysts study an organization's technology infrastructure, identify vulnerabilities, and recommend solutions. This course provides a foundation for the skills required in the role, such as analyzing exploit kits and detecting CNC communication.
Threat Intelligence Analyst
Threat Intelligence Analysts use their understanding of exploit kits and other types of malware to keep a company or organization safe. This course provides the tools and training needed to pursue this role.
Systems Engineer
Systems Engineers can use the skills taught in this course to keep exploit kits off of a company or organization's network.
Chief Technology Officer
Chief Technology Officers may use the skills taught in this course to make strategic decisions about it infrastructure and security.
Cryptographer
Cryptographers may use the skills taught in this course to develop security strategies in order to prevent and detect exploit kits.
Chief Information Officer
Chief Information Officers may use the skills taught in this course to make informed decisions about protecting their company or organization from threats such as exploit kits.
Red Team Operator
Red Team Operators use the skills and knowledge taught in this course to try to exploit networks, applications, and systems to detect vulnerabilities that could be exploited by cyber-criminals.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Advanced Malware Analysis: Combating Exploit Kits.
Covers advanced malware analysis techniques and tools, providing a valuable reference for professionals seeking to deepen their understanding and stay up-to-date.
Explores memory forensics techniques, which can be valuable in detecting and analyzing malware that may evade traditional analysis methods.
Offers a comprehensive overview of Windows malware analysis techniques and tools, especially valuable for professionals responsible for defending corporate networks.
Provides a collection of practical tools and techniques used by malware analysts, serving as a valuable reference guide.
Explores the broader context of cybercrime and cyberterrorism, providing insights into the threats posed by exploit kits.
While primarily focused on ethical hacking, this book offers insights into exploit development and analysis techniques, making it useful as supplementary reading.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser