Endpoint Defense

Learn all about Endpoint Defense with great learning resources from videos to articles to complete training courses.

Endpoint DefenseMalware Analysis

Provided by OpenSecurityTraining.info

Rootkits: What they are, and how to find them

Rootkits are a class of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and what tools can be used to help find them.

Reverse EngineeringEndpoint DefenseComputer Science

Provided by OpenSecurityTraining.info

The Life of Binaries

Topics include: Scanning and tokenizing source code; parsing a grammar; different targets for x86 assembly object files generation; linking object files together to create a well-formed binary; detailed descriptions of the high level similarities and low level differences between the Windows PE and Linux ELF binary formats; how an OS loads a binary into memory and links it on the fly before executing it.

Endpoint DefenseMalware Analysis

Provided by OpenSecurityTraining.info

Video Playlist: Rootkits: What they are, and how to find them

A Youtube playlist of the OpenSecurityTraining.info 'Rootkits' course being delivered. Rootkits are a class of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and what tools can be used to help find them.

Reverse EngineeringEndpoint DefenseComputer Science

Provided by OpenSecurityTraining.info

Video Playlist: The Life of Binaries

A Youtube playlist of the OpenSecurityTraining.info 'The Life of Binaries' course being delivered. Topics include: Scanning and tokenizing source code; parsing a grammar; different targets for x86 assembly object files generation; linking object files together to create a well-formed binary; detailed descriptions of the high level similarities and low level differences between the Windows PE and Linux ELF binary formats; how an OS loads a binary into memory and links it on the fly before executing it.