Analyzing Malware Attacks Using Sysmon - A Practical Guide to Event Logging and Investigation

Analyzing Malware Attacks Using Sysmon - A Practical Guide to Event Logging and Investigation

The Cyber Mentor via YouTube Direct link

Introduction -

1 of 10

1 of 10

Introduction -

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Analyzing Malware Attacks Using Sysmon - A Practical Guide to Event Logging and Investigation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction -
  2. 2 Sysmon Event IDs Overview -
  3. 3 Sponsor B-Roll -
  4. 4 Sysmon Installation -
  5. 5 Generating Payload -
  6. 6 Delivering the Payload via Discord -
  7. 7 Executing the Payload -
  8. 8 Post Compromise Attacks -
  9. 9 Analyzing the Attack with Sysmon -
  10. 10 Conclusion -

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.