Indicators of Compromise - From Malware Analysis to Eradication
44CON Information Security Conference via YouTube
Overview
This workshop teaches participants how to locate unknown malware in a corporate network, analyze malware samples to identify indicators of compromise, and use freely available tools to eradicate malware from the enterprise network. The course focuses on practical steps and techniques for malware analysis and removal. The intended audience for this workshop includes cybersecurity professionals, IT professionals, and individuals interested in learning about malware analysis and eradication techniques.
Syllabus
Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop
Taught by
44CON Information Security Conference