Pluralsight - Fileless Malware

Posted on 13 Sep 15:11 | by rai10 | 15 views
Pluralsight - Fileless Malware
Pluralsight - Fileless Malware
Size: 813.79 MB Type: eLearning Year: 2022 Version: 2022






Description

Description

In this course, you'll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.

What you'll learn

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you'll have a solid understanding of the various types of fileless malware and how best to defend against it.

Table of contents

Course Overview 2mins
What Is Fileless Malware? 5mins
How Does Fileless Malware Work? 29mins
Why Do Attackers Use These Techniques? 13mins
Defenses Against Fileless Malware: Employing Proper Logging 27mins
Defenses Against Fileless Malware: Utilizing Hunting Tools 18mins
Conclusion 6mins

About the authors

Aaron Rosenmund

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation. Leveraging his administration and automation experience, Aaron actively contributes to multiple open and closed source security operation platform projects and continues to create tools and content to benefit the community. As an educator & cyber security researcher at Pluralsight, he is focused on advancing cyber secur...

Tyler Hudak

Tyler Hudak has more than 15 years of extensive real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple Fortune 500 firms. He has spoken and taught at a number of security conferences on the topics of malware analysis, incident response, and penetration testing, and brings his frontl ine experience and proven techniques to bear in his training.







https://rapidgator.net/file/b05a6a13e6c35ae837a36cd70ddddbc9/Fileless_Malware_vis87.rar.html



Related News

Practical and Hands-On Malware Analysis (With Live Demos) Practical and Hands-On Malware Analysis (With Live Demos)
Practical and Hands-On Malware Analysis (With Live Demos)...
Malware Effects Remediation Tool  3.3 Malware Effects Remediation Tool 3.3
File Size : 4.8 Mb Malware Effects Remediation Tool is an Open Source tool meant for helping clean...
The Android Malware Handbook: Detection and Analysis by Human and Machine (True EPUB, MOBI) The Android Malware Handbook: Detection and Analysis by Human and Machine (True EPUB, MOBI)
The Android Malware Handbook: Detection and Analysis by Human and Machine (True EPUB, MOBI)...
Cyber Security Practical Malware  Analysis Cyber Security Practical Malware Analysis
Cyber Security Practical Malware Analysis Published 10/2022 MP4 | Video: h264, 1280x720 | Audio:...

System Comment

Information

Error Users of Visitor are not allowed to comment this publication.

Facebook Comment

Member Area
Top News