3 hours 47 minutes

Video Transcription

Hey, everyone, welcome back to the course. So in the last video, we wrapped up our lab on route kids again. That was an older route, kid, along with an older tool. But hopefully it helped you understand some of the fundamentals that we go through as we're analyzing, if we have a device that's infected with the root kit
and this video, we're just gonna go ahead and wrap up the course.
So we covered a few items in this course. We talked about the basics of malware. So we talked about the differences between viruses, worms. We talked about ransom, where some of the common malware that you're seeing out there, as well as some famous ones that have been in the media along with
analyzing a malicious file. So if you remember the first lab we did, we went ahead and created a malicious file and we went ahead and analyze that
malicious execute herbal. And then finally we wrapped up with a lab on a root kit. So again, in that one, we went ahead and
isolated the processes that were running. And then we went ahead and terminated those processes to make sure that we were stopping the root kit from taking action. And one thing we did not do in that lab that you would do in the real world is we would also look at the registry files to verify that those are legitimate process is running.
So you may be asking what's next. Like what else should I go for if I'm kind of interested in this malware stuff, But we do have a course on this site called a mobile malware analysis. Fundamental. So if you're looking for more of the defensive forensic side of things, that's a great course to take that kind of get your mind working Now, if you want to move into the offensive realm of things and actually write your own malware for research purposes, of course,
then I recommend you actually learned Python if you don't already know it. And the best way to do that is to actually use Joe Perry's courses
Introduction to Python, which will walk you through the basics and then Intermedia Python. That'll give you sort of that solid foundation to stand on. And then from there you can find additional information additional labs toe to go through to really hone your programming skills and then you can create your own malware again for research purposes.
So, as always, I just wanted to say thank you for taking this course and I will see in the next one.

Malware Threats

This Malware Threats course will provide students with an introduction to different types of malware, like viruses, worms, and Trojans. Students will gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor