To access material, start machines and answer questions login.
Every once in a while, when working as a analyst, you will encounter content (a file or traffic) that appears suspicious, and you will need to determine whether it is malicious. It is normal to feel confused with all the mixed signals such content provides. This becomes a little overwhelming for somebody just starting in cyber security, and it is common to begin questioning oneself. Knowing what steps to take to resolve such a scenario is helpful. This room will outline some steps to help you make an initial conclusion about a particular suspicious file.
Learning Objectives
- Understand what malware is.
- Use common tools and resources to assist your investigations.
- Perform basic static and .
- Set up a safe environment for analysis.
Prerequisites
So let's get started!
Ready to learn Cyber Security?
The Intro to Malware Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
