:Search:

Udemy Practical and Hands On Malware Analysis With Live Demos

Torrent:
Info Hash: 1B22F17076381557AC2BC7BFB951B343C92FB075
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 117
Type: Tutorials
Images:
Udemy Practical and Hands On Malware Analysis With Live Demos
Language: English
Category: Other
Size: 1.5 GB
Added: Oct. 23, 2023, 8:57 p.m.
Peers: Seeders: 22, Leechers: 3 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 5 1 67
udp://exodus.desync.com:6969/announce 5 0 3
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 5 0 21
udp://tracker.torrent.eu.org:451/announce 5 0 24
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 2 0 2
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1. Welcome to the Course & About Me.mp4 17.9 MB
  3. 1. Welcome to the Course & About Me.srt 1.4 KB
  4. 2. SneakPeak of Demonstrations Inside Course.mp4 17.4 MB
  5. 2. SneakPeak of Demonstrations Inside Course.srt 77 bytes
  6. 3. Who is this Course for, Course Summary & Learning Objectives.mp4 49.5 MB
  7. 3. Who is this Course for, Course Summary & Learning Objectives.srt 3.9 KB
  8. 1. Main Topics, What is Malware & Categories of Malware.mp4 161.0 MB
  9. 1. Main Topics, What is Malware & Categories of Malware.srt 12.0 KB
  10. 2. Types of Malware, Malware Infection Vectors & Malware Analysis.mp4 100.8 MB
  11. 2. Types of Malware, Malware Infection Vectors & Malware Analysis.srt 7.5 KB
  12. 3. Why Malware Analysis, Goals of Malware Analysis & What is Reverse Engineering.mp4 121.7 MB
  13. 3. Why Malware Analysis, Goals of Malware Analysis & What is Reverse Engineering.srt 8.6 KB
  14. 4. Software Reverse Engineering, Types of Software Reverse Engineering & Securit.mp4 113.8 MB
  15. 4. Software Reverse Engineering, Types of Software Reverse Engineering & Securit.srt 8.0 KB
  16. 5. Security-Related Reversing & Reversing in Software Development.mp4 87.7 MB
  17. 5. Security-Related Reversing & Reversing in Software Development.srt 6.0 KB
  18. 6. Low-Level Software.mp4 71.4 MB
  19. 6. Low-Level Software.srt 4.7 KB
  20. 7. Low-Level Software(II), Tools Needed & Precautions.mp4 92.0 MB
  21. 7. Low-Level Software(II), Tools Needed & Precautions.srt 6.9 KB
  22. 8. Precautions(II) & Environment Setup (SANDBOX).mp4 111.1 MB
  23. 8. Precautions(II) & Environment Setup (SANDBOX).srt 8.0 KB
  24. 1. Downloading VirtualBox, the Windows VM and the Flare VM package.mp4 56.1 MB
  25. 1. Downloading VirtualBox, the Windows VM and the Flare VM package.srt 5.9 KB
  26. 1.1 SETTING UP AN ENVIRONMENT FOR MALWARE ANALYSIS.docx 14.1 MB
  27. 2. Installing VirtualBox, Extracting and Importing Windows VM & Importing and S.mp4 37.4 MB
  28. 2. Installing VirtualBox, Extracting and Importing Windows VM & Importing and S.srt 9.5 KB
  29. 3. Taking Snapshots & Accessing Shared Flare VM Package.mp4 60.1 MB
  30. 3. Taking Snapshots & Accessing Shared Flare VM Package.srt 10.1 KB
  31. 4. Installing Flare VM Package.mp4 31.8 MB
  32. 4. Installing Flare VM Package.srt 5.5 KB
  33. 1. Precautions, the Tools, Getting String & Hashing.mp4 95.9 MB
  34. 1. Precautions, the Tools, Getting String & Hashing.srt 23.0 KB
  35. 1.1 LINK TO MALWARES AND OTHER TOOLS.html 145 bytes
  36. 1.2 PRACTICAL STATIC ANALYSIS MANUAL.docx 4.3 MB
  37. 2. Generating Hashes, Using Virustotal & Using CFF Explorer.mp4 113.5 MB
  38. 2. Generating Hashes, Using Virustotal & Using CFF Explorer.srt 22.5 KB
  39. 1. Using Fakenet & Regshot.mp4 99.3 MB
  40. 1. Using Fakenet & Regshot.srt 14.1 KB
  41. 1.1 PRACTICAL DYNAMIC ANALYSIS MANUAL.docx 10.3 MB
  42. 2. Using Regshot(II) & Executing Malware.mp4 30.1 MB
  43. 2. Using Regshot(II) & Executing Malware.srt 5.0 KB
  44. 3. Using Regshot(III) & Process Monitor.mp4 68.2 MB
  45. 3. Using Regshot(III) & Process Monitor.srt 6.7 KB
  46. Bonus Resources.txt 386 bytes

Discussion