Channel Avatar

Mossé Cyber Security Institute @UC_8_I5Ebq2haZxaLmpXM2TQ@youtube.com

None subscribers - no pronouns set

MCSI equips cyber operators and warriors with the knowledge


03:45
Writing a Python program that interacts with Windows APIs
05:12
Writing a C program that interacts with Windows APIs
04:05
Categories of Windows APIs
04:22
What are Windows APIs?
03:20
Windows APIs and System Calls
03:56
Remote Procedure Calls
05:02
Access Tokens
03:20
Elevation
06:21
Registry
03:52
Objects and Handles
04:00
Jobs
02:50
Virtual Memory
04:24
Drivers
02:01
Shared Memory
06:09
Users and Groups
05:49
Access Control Lists (ACLs)
03:11
Windows Services
04:01
Windows Threads
05:31
Windows Processes
03:42
User mode vs Kernel Mode
04:45
How to Perform Compliance Management in an Organization
04:44
What is Compliance Management and Why is it Important?
07:50
Validating and Monitoring Security Controls
04:56
Selecting Security Controls
03:40
Control Implementation Methods
03:47
Types of Internal Controls
03:49
What is a Control Objective and Control Measure?
04:11
What are Internal Controls?
04:39
Steps Involved in Business Continuity Planning
04:24
What is Disaster Recovery Planning?
04:46
What is Business Continuity Planning?
03:59
Performing Risk Reporting
05:30
Monitoring and Analyzing KRIs
05:41
Developing KRIs for Risk Monitoring
04:00
Updating the Risk Register
03:05
What is a Risk Register?
08:02
Extracting and analyzing strings from a malware sample
03:51
Decompiling .NET code using ILSpy
04:56
Using Sysmon to analyze a malware sample
08:45
Analyzing malware samples with ProcMon
06:56
Automated malware analysis with Cuckoo Sandbox
03:44
Introduction to Dynamic Analysis
05:43
Using YARA to identify and classify malware samples
05:50
Using file hashes to identify and classify malware samples
08:07
Using PEStudio to analyze malware
07:29
Using the Linux 'file' utility to recover file types
04:16
Using Resource Hacker to retrieve a malware's resources
03:31
Common IOCs to retrieve from malware reverse engineering
05:12
Protocol for safely handling and sharing malware samples
03:58
Setting up a lab for Malware Reverse Engineering
03:34
What is Systematic Approach to Malware Analysis (SAMA)?
03:20
How does malware work?
03:21
What knowledge do I need to have to be a reverse engineer?
03:40
What are the main categories of tools we use for SRE?
03:54
Establishing Ownership and Accountability
03:13
Different Ways of Treating Risk
03:56
The Risk Treatment Process
02:12
Plagiarism detected
03:55
Why do we reverse engineer software?
04:15
Risk Criteria and Risk Evaluation