Ransomware Practical Reverse Engineering
online class - 2017
Take an in-depth look at tools and techniques you can use to reverse engineer malware.
Saved in:
Holdings -
企業作者: | |
---|---|
其他作者: | |
格式: | 電子 影片 |
語言: | English |
出版: |
Carpenteria, CA
lynda.com,
2017.
|
主題: | |
在線閱讀: | Click here for information and access to this online class. |
MARC
LEADER | 00000263 a2200000 4500 | ||
---|---|---|---|
001 | LDC642487 | ||
003 | LDC | ||
005 | 20190307125500.0 | ||
006 | m c | ||
007 | cr cna a | ||
008 | 171204s2017 cau082 o vleng d | ||
949 | |a dt | ||
040 | |a lynda.com |b eng | ||
092 | 0 | |a ONLINE CLASS | |
100 | 1 | |a Shore, Malcolm, |e speaker. | |
245 | 1 | 0 | |a Ransomware: Practical Reverse Engineering. |h [online class] / |c with Malcolm Shore |
264 | 1 | |a Carpenteria, CA |b lynda.com, |c 2017. | |
264 | 4 | |c ℗♭2017 | |
306 | |a 01:22:39 | ||
336 | |a two-dimensional moving image |2 rdacontent | ||
337 | |a computer |2 rdamedia | ||
338 | |a online resource |2 rdacarrier | ||
500 | 0 | |a 11/28/2017 | |
511 | |a Presenter: Malcolm Shore. ["a", "Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB. Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security."] | ||
520 | |a Take an in-depth look at tools and techniques you can use to reverse engineer malware. | ||
520 | |a Ransomware is a growing threat, and it's imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomwaré the devastating WannaCry malwaréusing this case study to help you better understand how malware functions. | ||
538 | |a Latest version of the following browsers: Chrome, Safari,Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScriptand cookies must be enabled. A broadband Internet connection. | ||
653 | |a Streaming video | ||
653 | |a IT | ||
653 | |a Security | ||
710 | 2 | |a Lynda.com (Firm) | |
856 | 4 | 0 | |u http://www.lynda.com/IT-Infrastructure-tutorials/Ransomware-Practical-Reverse-Engineering/642487-2.html?org=spokanelibrary.org&utm_source=marc |z View course details on lynda.com |y Click here for information and access to this online class. |z You will be leaving Spokane Public Library's website. |t 0 |
998 | |a 2017.12.06 | ||
999 | f | f | |i 3ad2b7ca-3231-51e0-95ef-65e74690b4d9 |s fd8c4b5e-ed4f-5809-9226-ca883f9ec151 |t 0 |