1 00:00:00,660 --> 00:00:07,490 Hello, my name is Pouching, and I welcome you to my course entitled Reverse Engineering and Malware 2 00:00:07,500 --> 00:00:10,300 Analysis of the Net and Java. 3 00:00:11,010 --> 00:00:17,640 You know, they have been created almost every day and poses one of the greatest threat to computer 4 00:00:17,640 --> 00:00:19,080 systems everywhere. 5 00:00:19,650 --> 00:00:28,080 In order to infect Windows, Linux and make less malware, authors create a cross platform malware using 6 00:00:28,080 --> 00:00:29,580 dot net and Java. 7 00:00:30,300 --> 00:00:36,420 These costs will introduce you to the basics of how to analyze the Net and Java malware. 8 00:00:37,730 --> 00:00:44,870 Learning objectives, by the end of this course, you will know how to determine if an executable file 9 00:00:44,900 --> 00:00:45,710 is created. 10 00:00:45,890 --> 00:00:54,080 You've done it Ogiwara and also how to reverse engineer and tenderized it to look for malware, artifacts 11 00:00:54,290 --> 00:00:58,520 and indicators of compromise and determine if they are malicious. 12 00:00:59,750 --> 00:01:00,680 What you will learn. 13 00:01:01,070 --> 00:01:05,730 It is course you will learn how to install Flavien with your machine. 14 00:01:06,080 --> 00:01:12,800 One of the most popular platform for Millennialist containing all the tools you would need for analyzing 15 00:01:12,800 --> 00:01:13,270 malware. 16 00:01:14,000 --> 00:01:20,220 You will learn how to compile and disassemble Donette and Java binaries. 17 00:01:20,870 --> 00:01:29,900 The obfuscation of dot net and Java code detecting malware defects and indicators of compromise disassembling 18 00:01:29,900 --> 00:01:36,710 Donette binary to intermediate language, dynamic analysis and debugging using the spy. 19 00:01:37,510 --> 00:01:46,030 Static analysis, analyzing ransomware, analyzing spyware, Trojan and information stealer's recompiling 20 00:01:46,030 --> 00:01:53,910 because reverse engineering, analyzing cross platform rats, remote access, Trojans tools and all 21 00:01:55,360 --> 00:02:03,370 the prerequisites for taking this course, you need to have a Windows PC and an interesting malware 22 00:02:03,370 --> 00:02:05,410 analysis and reverse engineering. 23 00:02:06,850 --> 00:02:14,740 Who this course is for this course is suitable for anyone who has no background in NOVA analysis and 24 00:02:14,740 --> 00:02:16,500 just starting out in this field. 25 00:02:17,110 --> 00:02:25,480 It is also suitable for hobbyists who just like to learn how to analyze the Net and Java malware and 26 00:02:25,510 --> 00:02:30,910 also for students who like to get started on the career path to become malware analysts. 27 00:02:31,480 --> 00:02:36,970 And finally, it is also for anyone eager to learn how to detect new malware. 28 00:02:38,230 --> 00:02:39,010 My background. 29 00:02:39,460 --> 00:02:46,160 I am a retired college lecturer and I think teaching computer science night for more than three years. 30 00:02:46,780 --> 00:02:49,590 Thank you for watching and see you inside.