You are tasked with reverse engineering the NotPetya binary to understand its functionality. The IR team has already isolated the malware sample and sent it to your lab for analysis. Complete this series for a deeper understanding of digital forensics and technical incident response.
Intended Audience
- Intermediate to Advanced audiences with a background in IT & Information Security
- Early Digital Forensics specialists
- Malware Analysts
- Threat Intelligence Analysts
- Security Operations Center (Tier 1 & 2)
- Security Researchers
Suggested CyberEd Courses
- Fundamentals of Cybersecurity 1
- Fundamentals of Cybersecurity 2
- Fundamentals of Cybersecurity 3
- Linux Command Line
- CompTia Linux+ (XK0-005)
- Windows Terminal Skills
- Linux in the Cloud
Here is the course outline:
Ransomware: Analyzing Malicious Files Part 2 |