Coding Expectations for Malware & Pentesting
Here I answer a great question submitted by "Mav" who wants to know where to get started with coding for a role in Malware Analysis or Pentesting. Here, I give you my thoughts on what you can expect to come across in your day to day roles, talk about some of my favourite resources that helped me and some free courseware that really helped me understand Crypto. Also, I give you my take on the importance of certification / qualifications for breaking into industry.
Thank you Mav for the great question.
RESOURCES:
https://pentester.land
https://portswigger.net/web-security
https://www.amazon.co.uk/Rtfm-Red-Team-Field-Manual/dp/1494295504
https://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901
https://www.garykessler.net/library/crypto.html
YOUTUBERS:
cybercdh - https://youtube.com/c/ColinHardy -- of course :)
OALABS - https://www.youtube.com/channel/UC--DwaiMV-jtO-6EvmKOnqg
MalwareAnalysisForHedgeHogs - https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A
LiveOverflow - https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
NahamSec - https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw
COURSES:
https://www.coursera.org/learn/cryptography?specialization=cyber-security
https://www.sans.org/course/reverse-engineering-malware-malware-analysis-tools-techniques
LIKE & SUBSCRIBE:
If you liked the video, please give it the thumbs up. Also, please subscribe to keep up to date on the latest content.
Also - follow me on https://twitter.com/cybercdh
Peace.
Видео Coding Expectations for Malware & Pentesting канала Colin Hardy
Thank you Mav for the great question.
RESOURCES:
https://pentester.land
https://portswigger.net/web-security
https://www.amazon.co.uk/Rtfm-Red-Team-Field-Manual/dp/1494295504
https://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901
https://www.garykessler.net/library/crypto.html
YOUTUBERS:
cybercdh - https://youtube.com/c/ColinHardy -- of course :)
OALABS - https://www.youtube.com/channel/UC--DwaiMV-jtO-6EvmKOnqg
MalwareAnalysisForHedgeHogs - https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A
LiveOverflow - https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
NahamSec - https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw
COURSES:
https://www.coursera.org/learn/cryptography?specialization=cyber-security
https://www.sans.org/course/reverse-engineering-malware-malware-analysis-tools-techniques
LIKE & SUBSCRIBE:
If you liked the video, please give it the thumbs up. Also, please subscribe to keep up to date on the latest content.
Also - follow me on https://twitter.com/cybercdh
Peace.
Видео Coding Expectations for Malware & Pentesting канала Colin Hardy
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Live Stream - Finding Emotet's ConfigCOVID19 Malware - Getting Closer to the Bad GuysSwift Programming Tutorial for Beginners (Full Tutorial)Self-Study Methodology for Certified Fraud Examiner (CFE) ExamAnalysing Obfuscated VBA - Extracting indicators from a Trickbot downloaderExcel 4.0 Macros Analysis - Cobalt Strike Shellcode InjectionBeginner Web Application Hacking (Full Course)Olympic Destroyer - Quick behavioural Analysis of this Wiper MalwareCyber security Online demo from MagistersignFree Amazon AWS Training's and Certifications : Cyber Security , IOT and AWS Cloud CertificationsLearn JavaScript - Full Course for BeginnersWannaCry Ransomware - Revisited. Behavioural and Static Analysis TechniquesLive Stream - Part 2 - Emotet Downloader AnalysisUsing WhatsApp for Malware PersistenceGit Tutorial for Beginners: Command-Line FundamentalsCVE-2017-8570 - Dynamic analysis of Exploit used in Powerpoint to deliver KeyBase InfoStealerGetting started in Cyber SecurityA simple Format String exploit example - bin 0x11Malware Lab Setup - Network ConfigurationWix Tutorial for Beginners (2020 Full Tutorial) - Create A Professional Website