Malware Analysis and Reverse Engineering Course

Malware Analysis and Reverse Engineering Course

Priyank Gada via YouTube Direct link

Malware analysis and reverse engineering expert - Lecture 1 - Don't just buy the course.

1 of 30

1 of 30

Malware analysis and reverse engineering expert - Lecture 1 - Don't just buy the course.

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Malware Analysis and Reverse Engineering Course

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Malware analysis and reverse engineering expert - Lecture 1 - Don't just buy the course.
  2. 2 Malware analysis and reverse engineering expert - Lecture 2 - Malware
  3. 3 Malware analysis and reverse engineering expert - Lecture 3 - Replicator
  4. 4 Malware analysis and reverse engineering expert - Lecture 4 - Concealer
  5. 5 Malware analysis and reverse engineering expert - Lecture 5 - Bomb
  6. 6 Malware analysis and reverse engineering expert - Lecture 6 - What is Malware Analysis
  7. 7 Malware analysis and reverse engineering expert - Lecture 7 - Viruses
  8. 8 Malware analysis and reverse engineering expert - Lecture 8 - Trojans
  9. 9 Malware analysis and reverse engineering expert - Lecture 9 - Worms
  10. 10 Malware analysis and reverse engineering expert - Lecture 10 - Rootkits
  11. 11 Malware analysis and reverse engineering expert - Lecture 11 - Adwares
  12. 12 Malware analysis and reverse engineering expert - Lecture 12 - Ransomware
  13. 13 Malware analysis and reverse engineering expert - Lecture 13 - Backdoors
  14. 14 Malware analysis and reverse engineering expert - Lecture 14 - Malware Infection Statistics
  15. 15 Malware analysis and reverse engineering expert - Lecture 15 - Malware Code Reversing.
  16. 16 Malware analysis and reverse engineering expert - Lecture 16 - Interaction Analysis
  17. 17 Malware analysis and reverse engineering expert - Lecture 17 - Static Properties Analysis
  18. 18 Malware analysis and reverse engineering expert - Lecture 18 - Automated Analysis
  19. 19 Malware analysis and reverse engineering expert - Lecture 19 - Downloading and Installing VirtualBox
  20. 20 Malware analysis and reverse engineering expert - Lecture 20 - Flare VM
  21. 21 Malware analysis and reverse engineering expert - Lecture 21 - Flare VM method 2
  22. 22 Malware analysis and reverse engineering expert - Lecture 22 - Snapshots and Other important setting
  23. 23 Malware analysis and reverse engineering expert - Lecture 23 - Dynamic Malware Analysis - Processes
  24. 24 Malware analysis and reverse engineering expert - Lecture 24 - Dynamic Malware Analysis Of Network
  25. 25 Malware analysis and reverse engineering expert - Lecture 25 - Dynamic Malware Analysis of Registry
  26. 26 Malware analysis and reverse engineering expert - Lecture 26 - What are debuggers - Keyterms
  27. 27 Malware analysis and reverse engineering expert - Lecture 27 - Working with OllyDbg - Debugging
  28. 28 Malware analysis and reverse engineering expert - Lecture 28 - x86 Architecture assembly language
  29. 29 Malware analysis and reverse engineering expert - Lecture 29 - Analysing binded multimedia malwares
  30. 30 Malware analysis and reverse engineering expert - Lecture 30 - Extracting Malware Binaries

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.