Time
49 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
they have one cannot reveal. Here, master instructor. A cyber again. I'm here with Dave. Could practice. We want to thank you for finishing the course We always enjoy when you get to the end. And I know you enjoy it too. We hope you enjoy the course. We just want to mention that in this course, we covered
00:15
some labs, so we got a little hands on day showed you it ransomware attack. He also showed you some encryption again. He's gonna be having a course come out on setting up your own hacking lab as well as the future course on running your own Mauer. So exciting steps of Mauer interest you at all. Definitely keep an eye out for this course is
00:34
in the last video. We wrapped up our lab, so Dave wrapped up his particular labs.
00:38
And we also just want to mention that with this course. And we kind of mentioned in the introduction video with this course, some of the piggyback courses coming out or things like our analysis by David Visor as well as a lot of other Mauer related courses coming out on the site. So we just want to mention that We want to thank everyone for taking this course and we want to wave good bye to everybody
00:58
and we'll see in the next course.

Malware Threats

This malware analysis training course covers basic information about things like viruses, worms, Trojans, ransomware, and more.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor