You are tasked with inspecting and analyzing the behavior of malicious files. The IR team has already isolated the malware sample and sent it to your lab for analysis. Complete this series for a deeper understanding of digital forensics and technical incident response.
Intended Audience
- Digital Forensics
- Incident Response
- Malware Analysts
- Threat Hunters
- SOC Analysts
Suggested CyberEd Courses
- Fundamentals of Cybersecurity 1
- Fundamentals of Cybersecurity 2
- Fundamentals of Cybersecurity 3
- Linux Command Line
- CompTia Linux+ (XK0-005)
- Windows Terminal Skills
- Linux in the Cloud
Here is the course outline:
Ransomware: Analyzing Malicious Files |
Ransomware: Analyzing Malicious Files Part 2 |