Ransomware Practical Reverse Engineering

with Malcolm Shore
online class - 2017

Take an in-depth look at tools and techniques you can use to reverse engineer malware.

Saved in:

Holdings -

書目詳細資料
企業作者: Lynda.com (Firm)
其他作者: Shore, Malcolm (Speaker)
格式: 電子 影片
語言:English
出版: Carpenteria, CA lynda.com, 2017.
主題:
在線閱讀:Click here for information and access to this online class.

MARC

LEADER 00000263 a2200000 4500
001 LDC642487
003 LDC
005 20190307125500.0
006 m c
007 cr cna a
008 171204s2017 cau082 o vleng d
949 |a dt 
040 |a lynda.com  |b eng 
092 0 |a ONLINE CLASS 
100 1 |a Shore, Malcolm,  |e speaker. 
245 1 0 |a Ransomware: Practical Reverse Engineering.  |h [online class] /  |c with Malcolm Shore 
264 1 |a Carpenteria, CA  |b lynda.com,  |c 2017. 
264 4 |c ℗♭2017 
306 |a 01:22:39 
336 |a two-dimensional moving image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 0 |a 11/28/2017 
511 |a Presenter: Malcolm Shore. ["a", "Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB. Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security."] 
520 |a Take an in-depth look at tools and techniques you can use to reverse engineer malware. 
520 |a Ransomware is a growing threat, and it's imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomwaré the devastating WannaCry malwaréusing this case study to help you better understand how malware functions. 
538 |a Latest version of the following browsers: Chrome, Safari,Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScriptand cookies must be enabled. A broadband Internet connection. 
653 |a Streaming video 
653 |a IT 
653 |a Security 
710 2 |a Lynda.com (Firm) 
856 4 0 |u http://www.lynda.com/IT-Infrastructure-tutorials/Ransomware-Practical-Reverse-Engineering/642487-2.html?org=spokanelibrary.org&utm_source=marc  |z View course details on lynda.com  |y Click here for information and access to this online class.  |z You will be leaving Spokane Public Library's website.  |t 0 
998 |a 2017.12.06 
999 f f |i 3ad2b7ca-3231-51e0-95ef-65e74690b4d9  |s fd8c4b5e-ed4f-5809-9226-ca883f9ec151  |t 0