COURSE AUTHOR –
John Courtenay
1. An explanation of the key differences between malware analysis and incident response
2. Known malware, online file analysis and tools that can be used to analyse running processes
3. Unknown malware and how to recognise suspicious files, using heuristic activity detection and vulnerability analysis
4. Incident prevention methods, including securing removable storage and an explanation of email filtering and analysis tools.
5. Incident prevention methods, including securing removable storage and an explanation of email filtering and analysis tools.