We may earn an affiliate commission when you visit our partners.
Brian Dorr

LOKI is an open-source Indicator of Compromise (IOC) scanner utilizing YARA rules with complex sets of characteristics, file hashes, and patterns for malware identification and classification. It includes a predefined rule set and allows user additions.

Read more

LOKI is an open-source Indicator of Compromise (IOC) scanner utilizing YARA rules with complex sets of characteristics, file hashes, and patterns for malware identification and classification. It includes a predefined rule set and allows user additions.

Detecting malware is crucial because it is the first step in safeguarding sensitive information and maintaining system integrity, and plays a critical role in preventing potential disruptions, loss of data, and breaches in privacy, all of which are essential in today's digitally interconnected world. In this course, File Analysis with LOKI, you’ll learn how to utilize LOKI Simple IOC scanner to scan files and potentially discover indicators of compromise to help safeguard your network. First, you’ll discuss what LOKI Simple IOC scanner is and what features it has. Next, you'll use it to scan a couple sample files to see how effective LOKI is in detecting indicators of compromise. Finally, you'll explore how to add newly discovered IOCs from malware analysis triage in any run. When you’re finished with this course, you’ll have the skills and knowledge to run LOKI Simple IOC scanner against files to detect indicators of compromise and add additional IOCs in order to detect potential adversarial activity and reduce security gaps.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Detecting IOCs on Files with LOKI
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills needed to detect indicators of compromise
Teaches how to utilize LOKI Simple IOC Scanner to recognize potential adversarial activity
Introduces LOKI Simple IOC Scanner, a tool for detecting malicious files
Shows learners how to incorporate newly discovered IOCs from triage to detect threats
Taught by Brian Dorr
Designed for those interested in Malware Identification in a Cybersecurity Setting

Save this course

Save File Analysis with LOKI to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in File Analysis with LOKI with these activities:
Review Threat Intelligence and IOCs
Refresh your knowledge of threat intelligence and indicators of compromise (IOCs) to strengthen your comprehension of LOKI's role in malware detection and threat prevention.
Show steps
  • Review key concepts of threat intelligence and IOCs.
  • Identify different types of IOCs and their significance.
  • Understand how IOCs are used in threat detection and prevention.
Scan file samples with LOKI
Practice working with LOKI by scanning sample files to identify indicators of compromise, which will strengthen your understanding of the tool's capabilities and effectiveness.
Show steps
  • Identify the target file(s) for scanning.
  • Run LOKI to scan the selected file(s).
  • Examine the scan results and identify any discovered indicators of compromise (IOCs).
Participate in a LOKI user discussion forum
Engage with other LOKI users and experts in a discussion forum to share knowledge, ask questions, and gain insights into best practices for IOC scanning and malware detection.
Browse courses on Malware Detection
Show steps
  • Join a LOKI user discussion forum or online community.
  • Introduce yourself and share your experience using LOKI.
  • Participate in discussions, ask questions, and respond to others.
One other activity
Expand to see all activities and additional details
Show all four activities
Create a LOKI IOC scanning cheatsheet
Create a personalized LOKI IOC scanning cheatsheet that summarizes the key steps, commands, and best practices for using LOKI effectively. This will serve as a valuable resource for you in future IOC scanning tasks.
Show steps
  • Gather the necessary information from LOKI documentation and tutorials.
  • Organize the information into a clear and concise format.
  • Consider including examples and practical tips.
  • Save and share your cheatsheet for easy reference.

Career center

Learners who complete File Analysis with LOKI will develop knowledge and skills that may be useful to these careers:
Cyber Threat Analyst
A Cyber Threat Analyst is responsible for identifying, analyzing, and mitigating cybersecurity threats. They monitor security systems, analyze threat intelligence, and develop strategies to protect an organization's data and systems from attacks. This course can be helpful for aspiring Cyber Threat Analysts as it provides hands-on experience in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for identifying and understanding emerging cyber threats.
Information Security Specialist
An Information Security Specialist is responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security policies and procedures, conduct security assessments, and monitor and respond to security incidents. This course can be helpful for Information Security Specialists as it provides hands-on experience in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for identifying and mitigating security risks.
Security Architect
A Security Architect is responsible for designing and implementing an organization's cybersecurity architecture. They work with stakeholders to identify security requirements, develop security policies, and design and implement security controls to protect an organization's data and systems from threats and attacks. This course can be useful for Security Architects as it provides training on using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for designing effective cybersecurity architectures.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security infrastructure. They work with stakeholders to identify security requirements, develop security policies, and design and implement security controls to protect an organization's data and systems from threats and attacks. This course can be helpful for aspiring Network Security Engineers as it provides training on using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for identifying and mitigating network security threats.
Cybersecurity Engineer
A Cybersecurity Engineer is responsible for designing, implementing, and maintaining cybersecurity systems to protect an organization's data and systems from threats and attacks. They identify and mitigate vulnerabilities, develop security policies, and monitor security systems to ensure their effectiveness. This course can be helpful for aspiring Cybersecurity Engineers as it provides training on using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for detecting and responding to cyberattacks.
Security Analyst
A Security Analyst is responsible for monitoring, detecting, and responding to security threats and vulnerabilities. They conduct security assessments, analyze security-related data, and implement security measures to protect an organization's data and systems. This course can be helpful for aspiring Security Analysts as it provides training on using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is crucial for identifying and preventing security breaches.
IT Security Consultant
An IT Security Consultant provides expert advice and guidance to organizations on how to improve their cybersecurity posture. They conduct security assessments, develop security plans, and recommend security solutions to meet an organization's specific needs. This course can help aspiring IT Security Consultants build a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which is essential for identifying and mitigating security risks.
Forensic Analyst
A Forensic Analyst is responsible for investigating and analyzing digital evidence to support legal proceedings. They collect and analyze digital data, such as computer hard drives and mobile devices, to identify and recover evidence related to cybercrimes. This course can be useful for Forensic Analysts as it provides hands-on experience in using LOKI Simple IOC scanner to detect indicators of compromise, which can be crucial for uncovering malicious activity and supporting digital forensics investigations.
Malware Analyst
A Malware Analyst is an IT professional responsible for examining and analyzing malicious software, such as malware, viruses, and spyware. They identify and mitigate malware threats by analyzing malicious code samples, generating reports, and recommending proactive measures to prevent and remove threats. This course may be useful for aspiring Malware Analysts as it provides a strong foundation in using LOKI Simple IOC scanner to scan files, potentially discovering indicators of compromise, and adding additional IOCs to enhance detection capabilities.
Data Scientist
A Data Scientist analyzes and interprets large datasets to extract meaningful insights and patterns. They use statistical models and machine learning algorithms to predict trends, identify anomalies, and make data-driven decisions. This course can be helpful for aspiring Data Scientists as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for detecting and investigating security incidents involving large datasets.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. They design, implement, and maintain network infrastructure, monitor network performance, and troubleshoot network issues. This course may be useful for aspiring Network Administrators as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for detecting and mitigating network security threats.
Systems Analyst
A Systems Analyst designs and implements computer systems and applications. They work with stakeholders to gather requirements, develop system solutions, and ensure the quality and performance of systems. This course may be useful for aspiring Systems Analysts as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for developing secure and reliable systems.
Computer Systems Analyst
A Computer Systems Analyst designs and implements computer systems and applications. They work with stakeholders to gather requirements, develop system solutions, and ensure the quality and performance of systems. This course may be useful for aspiring Computer Systems Analysts as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for developing secure and reliable systems.
Computer Programmer
A Computer Programmer writes and maintains code for software applications. They work with stakeholders to gather requirements, develop software solutions, and ensure the quality and performance of software systems. This course may be useful for aspiring Computer Programmers as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for developing secure software applications.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. They work with stakeholders to gather requirements, develop software solutions, and ensure the quality and performance of software systems. This course may be useful for aspiring Software Engineers as it provides a foundation in using LOKI Simple IOC scanner, a tool for detecting indicators of compromise, which can be useful for developing secure software applications.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in File Analysis with LOKI.
Classic in the field of computer security and provides a fascinating account of how Stoll tracked down a hacker who had infiltrated his computer system. It great introduction to the world of malware analysis and incident response.
Provides a comprehensive overview of memory forensics and shows how to use memory forensics techniques to detect malware and other threats. It valuable resource for anyone who wants to learn more about memory forensics.
Provides a step-by-step guide to malware analysis, covering topics such as how to set up a malware analysis lab, how to collect and analyze malware samples, and how to write malware analysis reports.
Practical guide to incident response. It provides step-by-step instructions on how to respond to security incidents, such as malware infections and data breaches.
Provides a comprehensive overview of ethical hacking techniques. It shows how to use ethical hacking techniques to identify and exploit vulnerabilities in computer systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to File Analysis with LOKI.
Network Analysis with Real Intelligence Threat Analytics...
Most relevant
Threat Intelligence: The Big Picture
Most relevant
Malware Analysis: Identifying and Defeating Code...
Most relevant
Security Operations for CySA+
Most relevant
Business Email Compromise
Most relevant
Threat Intelligence with MISP
Most relevant
Ethical Hacking: Understanding Ethical Hacking
Most relevant
OS Analysis with The Sleuth Kit & Autopsy
Most relevant
Threat Hunt with IBM Security QRadar
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser