Skip to content

Ransomware: Analyzing Malicious Files Part 2


Course
Upgrade subscription below

You are tasked with reverse engineering the NotPetya binary to understand its functionality. The IR team has already isolated the malware sample and sent it to your lab for analysis. Complete this series for a deeper understanding of digital forensics and technical incident response.

Intended Audience

  • Intermediate to Advanced audiences with a background in IT & Information Security
  • Early Digital Forensics specialists
  • Malware Analysts
  • Threat Intelligence Analysts
  • Security Operations Center (Tier 1 & 2)
  • Security Researchers

Suggested CyberEd Courses

 

 

Here is the course outline:

Ransomware: Analyzing Malicious Files Part 2