Indicators of Compromise - From Malware Analysis to Eradication
44CON Information Security Conference via YouTube
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive workshop that guides you through the process of identifying, analyzing, and eradicating unknown malware from corporate networks. Learn how to locate suspicious software, conduct thorough malware analysis, and identify crucial indicators of compromise. Discover techniques for effectively removing malware from enterprise systems using freely available tools, some of which may already be part of your existing security infrastructure. Gain valuable insights from security expert Michael Boman as he presents this 1-hour and 24-minute session at the 44CON Information Security Conference, equipping you with practical skills to enhance your organization's cybersecurity defenses.
Syllabus
Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop
Taught by
44CON Information Security Conference