File | Size |
---|
1.Exploring Malware Functionalities/01.The Course Overview.mp4 | 16.03 MB |
1.Exploring Malware Functionalities/02.Backdoors.mp4 | 19.99 MB |
1.Exploring Malware Functionalities/03.Keyloggers and Information Stealers.mp4 | 12.80 MB |
1.Exploring Malware Functionalities/04.Downloaders.mp4 | 10.91 MB |
1.Exploring Malware Functionalities/05.Ransomware.mp4 | 16.15 MB |
1.Exploring Malware Functionalities/06.Rootkits.mp4 | 18.08 MB |
2.Malware Advanced Techniques/07.Privilege Escalation.mp4 | 13.67 MB |
2.Malware Advanced Techniques/08.Persistence Methods.mp4 | 8.63 MB |
2.Malware Advanced Techniques/09.Data Encoding.mp4 | 16.85 MB |
2.Malware Advanced Techniques/10.Covert Launching Techniques.mp4 | 13.52 MB |
3.Advanced Dynamic Malware Analysis/11.Using a Debugger.mp4 | 6.01 MB |
3.Advanced Dynamic Malware Analysis/12.An Overview of the Windows Environment.mp4 | 14.73 MB |
3.Advanced Dynamic Malware Analysis/13.User Mode Debugging.mp4 | 12.08 MB |
3.Advanced Dynamic Malware Analysis/14.Malware Analysis Using OllyDbg.mp4 | 61.62 MB |
3.Advanced Dynamic Malware Analysis/15.Features of OllyDbg.mp4 | 42.10 MB |
3.Advanced Dynamic Malware Analysis/16.Kernel Mode Debugging.mp4 | 6.39 MB |
3.Advanced Dynamic Malware Analysis/17.Malware Analysis Using WINDBG.mp4 | 32.38 MB |
3.Advanced Dynamic Malware Analysis/18.Features of WINDBG.mp4 | 22.82 MB |
4.Advanced Static Malware Analysis/19.Advanced Notes on the x86 Architecture.mp4 | 16.07 MB |
4.Advanced Static Malware Analysis/20.How a Disassembler Can Help Us.mp4 | 8.98 MB |
4.Advanced Static Malware Analysis/21.Loading and Navigating Using IDA Pro.mp4 | 37.31 MB |
4.Advanced Static Malware Analysis/22.Functions in IDA.mp4 | 30.12 MB |
4.Advanced Static Malware Analysis/23.IDA Pro Graphic Features.mp4 | 29.77 MB |
4.Advanced Static Malware Analysis/24.Analysing Malware Using IDA Pro.mp4 | 34.03 MB |
5.How to Detect and Defend against Malware in a Network/25.Malware Detection Techniques.mp4 | 9.40 MB |
5.How to Detect and Defend against Malware in a Network/26.Steps to Clean a Compromised Network.mp4 | 11.22 MB |
5.How to Detect and Defend against Malware in a Network/27.How Intrusion Detection Systems Work.mp4 | 4.63 MB |
5.How to Detect and Defend against Malware in a Network/28.An Introduction to Snort.mp4 | 4.33 MB |
5.How to Detect and Defend against Malware in a Network/29.How to Setup Snort.mp4 | 47.45 MB |
6.How to Deal with Evasive Malware/30.How Do Packers Work.mp4 | 5.87 MB |
6.How to Deal with Evasive Malware/31.How to Detect Packed Malware.mp4 | 20.73 MB |
6.How to Deal with Evasive Malware/32.How to Unpack a Malware Program.mp4 | 5.81 MB |
6.How to Deal with Evasive Malware/33.Examples of Unpacking a Malware Program.mp4 | 46.86 MB |
Discuss.FreeTutorials.Us.html | 165.68 kB |
Exercise Files/code_34772.zip | 1.45 MB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |