
Course overview
How to Design and Defend Against Malware
47 modules
·190 lessons
·—
Part 1
Part 2
Part 3
Part 4
Part 5
Part 6
Part 7
Part 8
Part 9
Persistence, Stealth, and Evasion (Conceptual)
Part 10
Initial Infection Vectors (High Level)
Part 11
Propagation and Lateral Movement (High Level)
Part 12
Human Factors in Malware Spread
Part 13
Endpoint Surfaces: OS, Apps, Browsers
Part 14
Server, Cloud, and API Surfaces
Part 15
Deeper Surfaces: Firmware, Hardware, and Devices
Part 16
Mapping and Reducing Attack Surface
Part 17
Malware Classification and Families
Part 18
Static Analysis (Defender View)
Part 19
Dynamic Analysis and Behavioral Observation
Part 20
Sandboxes, EDR, and Telemetry Sources
Part 21
Using Analysis to Drive Detection and Controls
Part 22
OS Isolation and Privilege Boundaries
Part 23
Application Sandboxing and Confinement
Part 24
Memory and Execution Defenses (Conceptual)
Part 25
Application Control and Whitelisting
Part 26
Endpoint Protection and EDR Patterns
Part 27
Malware in the Network: C2 and Exfiltration
Part 28
Network Segmentation and Containment
Part 29
Email, Web, and Content Gateways
Part 30
Network Detection and Response Concepts
Part 31
Deception and Honeypots (High Level)
Part 32
Detecting and Confirming Malware Events
Part 33
Part 34
Eradication and Recovery
Part 35
Forensics and Root Cause (Conceptual)
Part 36
Communication, Reporting, and Legal Considerations
Part 37
Lessons Learned into Architecture and Process
Part 38
Defense-in-Depth for Malware
Part 39
Threat Modeling for Malware Resilience
Part 40
Security Architecture for Malware Defense
Part 41
Governance, Policy, and Training
Part 42
Metrics, Maturity, and Continuous Improvement
Part 43
Case Studies of Defense Evolution (High Level)
Part 44
Malware Defense Patterns
Part 45
Operational Patterns for Malware Defense
Part 46
Anti-Patterns and Common Pitfalls
Part 47