Malware Analysis: The Big Picture

Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
Course info
Rating
(11)
Level
Beginner
Updated
Mar 9, 2017
Duration
2h 14m
Table of contents
Course Overview
Malware: Why Should You Care?
Best Practices
Tools and Teams
Investigative and Legal Considerations
Description
Course info
Rating
(11)
Level
Beginner
Updated
Mar 9, 2017
Duration
2h 14m
Description

Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you'll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you're finished with this course, you'll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Christopher Rees, and welcome to my course Malware Analysis: The Big Picture. In addition to be a trainer here at Pluralsight, I'm also an IT ops manager for a very large enterprise, and I have over 20 years of IT experience. I'm also a former law enforcement officer who specialized in computer crimes, and in addition to all of that, I've been training students from all over the world on various technologies since 1998. So regarding this course, why is it important? Well this course is super important, whether you're an individual contributor, a frontline supervisor, executive management, or even on the board of directors of a large enterprise. Malware breaches cost companies of all sizes over 350 billion dollars a year, and we waste over 1 billion hours per year with security issues related to malware, so it's a big deal. For public and private companies, these numbers are staggering, obviously, but for government agencies, these concerns are even worse with malware attacks being responsible for unauthorized access to confidential information, reputation with allied nations and trading partners, and perhaps most importantly, attacks on critical infrastructure. So some of the major topics that we'll cover will be identifying who needs this course and why, why it's important for you, the various types of malware analysis that are available, and also which are best suited for a particular situation, also including the methods of transmission or infection. We'll also talk about malware investigations. In other words, the tools and the teams that are needed to effectively process the breach and also the golden hour decisions or the important decisions right after that breach or incident occurs. We'll also talk about handling the press, which a lot of people don't think about, by presenting a very concise and a very consistent message to the press, and having dedicated people to do this is of critical importance to the reputation of your company to how your customers and also how do investors perceive you. And then also questions and concerns relevant to the board of directors so that way you can ensure you're identifying the threats properly, doing a gap analysis to ensure those holes are being filled, and also, most importantly, dedicating resources in the right areas. So by the end of this course, you'll have the information and language and terminology, and most importantly the key focus areas necessary to ensure your company is fully addressing the massive threat that malware posses to your company. You'll understand the types of threats, response best practices, and the tools, teams, and resources required to mitigate and remediate those malware threats within your environment. So I hope you'll join me on this journey and help keep malware out of your environment by watching Malware Analysis: The Big Picture, here at Pluralsight.

Malware: Why Should You Care?
Hey everyone, welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this course, Malware Analysis: The Big Picture, we're going to specifically cover in this module, Malware: Why Should You Care? Alright, so let's go ahead and get started and talk about what we have to cover. We're going to talk about malware overview, what is malware, what it's comprised of, and so forth. We'll talk about the potential impacts, and this is kind of the why should you care piece, the things that could impact your company both financially and also consumer confidence and so forth. We'll talk about methods of transmission, how does the malware actually get onto a host, how does it get into your systems and infect your networks and so forth. And then we'll talk about the goals of malware analysis, the actual steps that are within that overall analysis process. So let's go ahead and get started.

Best Practices
Hey everyone, welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this module we're going to talk about best practices with regard to malware analysis and so forth. So let's go ahead and get started and talk about what we're going to look at in this module. So we're going to start off with understanding the potential impacts of a malware infection. We'll talk about what's at risk. We'll also talk about best practices around malware incident response. And primarily, we want to look at mitigating impact and the restoration after an attack. And then lastly we'll focus on an overview of the NIST guidelines. So let's go ahead and get started.

Investigative and Legal Considerations
Hey, welcome back to Pluralsight. I'm your instructor Christopher Rees, and in this module we're going to cover investigative and legal considerations. So, very important module, especially for executive management, board members, people that are in control of a company at a high level. Some really critical stuff in here that you need to be aware of, if you're not already, and this is a great module to review to make sure you're policies and procedures are up to snuff. So the main things we're going to cover are acquiring evidence during a malware investigation, we'll talk about digital forensics and incident response, we'll talk about handling the press. And sounds almost like a no-brainer, but in today's age with all the different types of media outlets that are out there, it's important that we control our message, especially in the event of a breach, and make sure that our message is being handled correctly, information is not leaked inadvertently, misinformation, or just falsehoods. We want to make sure we're protecting our image. And then lastly, things of importance to a company's board of directors. So let's go ahead and get started.