Overview
Learn to detect anomalies in macOS systems and identify malware targeting different versions of macOS operating systems. Understand how threat actors attack macOS endpoints and utilize macOS utilities in their attack kill chain. Gain insights into identifying suspicious activity on macOS platforms, especially with the rise of work-from-home policies. The course covers topics such as the macOS malware landscape, detection technology, attack frameworks, offensive tools, and correlation techniques. Intended for individuals interested in cybersecurity, threat intelligence, and macOS security.
Syllabus
Introduction
Agenda
MacOS Malware Landscape
Detection Technology
My Attack Framework
OS Query
Case Study
Utility Variation
Offensive Tools
Unusual Utility
Correlation
Taught by
nullcon