Conclusion
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hey, everyone, welcome back to the course. So in the last video, we wrapped up our lab on route kids again. That was an older route, kid, along with an older tool. But hopefully it helped you understand some of the fundamentals that we go through as we're analyzing, if we have a device that's infected with the root kit
00:14
and this video, we're just gonna go ahead and wrap up the course.
00:17
So we covered a few items in this course. We talked about the basics of malware. So we talked about the differences between viruses, worms. We talked about ransom, where some of the common malware that you're seeing out there, as well as some famous ones that have been in the media along with
00:31
analyzing a malicious file. So if you remember the first lab we did, we went ahead and created a malicious file and we went ahead and analyze that
00:38
malicious execute herbal. And then finally we wrapped up with a lab on a root kit. So again, in that one, we went ahead and
00:46
isolated the processes that were running. And then we went ahead and terminated those processes to make sure that we were stopping the root kit from taking action. And one thing we did not do in that lab that you would do in the real world is we would also look at the registry files to verify that those are legitimate process is running.
01:04
So you may be asking what's next. Like what else should I go for if I'm kind of interested in this malware stuff, But we do have a course on this site called a mobile malware analysis. Fundamental. So if you're looking for more of the defensive forensic side of things, that's a great course to take that kind of get your mind working Now, if you want to move into the offensive realm of things and actually write your own malware for research purposes, of course,
01:23
then I recommend you actually learned Python if you don't already know it. And the best way to do that is to actually use Joe Perry's courses
01:30
Introduction to Python, which will walk you through the basics and then Intermedia Python. That'll give you sort of that solid foundation to stand on. And then from there you can find additional information additional labs toe to go through to really hone your programming skills and then you can create your own malware again for research purposes.
01:49
So, as always, I just wanted to say thank you for taking this course and I will see in the next one.
Instructed By
Similar Content