Endpoint Defense
Learn all about Endpoint Defense with great learning resources from videos to articles to complete training courses.
Online Training
external-learning-resource
The Life of Binaries
Topics include: Scanning and tokenizing source code; parsing a grammar; different targets for x86 assembly object files generation; linking object files together to create a well-formed binary; detailed descriptions of the high level similarities and low level differences between the Windows PE and Linux ELF binary formats; how an OS loads a binary into memory and links it on the fly before executing it.
external-learning-resource
Video Playlist: Rootkits: What they are, and how to find them
A Youtube playlist of the OpenSecurityTraining.info 'Rootkits' course being delivered. Rootkits are a class of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and what tools can be used to help find them.
external-learning-resource
Video Playlist: The Life of Binaries
A Youtube playlist of the OpenSecurityTraining.info 'The Life of Binaries' course being delivered. Topics include: Scanning and tokenizing source code; parsing a grammar; different targets for x86 assembly object files generation; linking object files together to create a well-formed binary; detailed descriptions of the high level similarities and low level differences between the Windows PE and Linux ELF binary formats; how an OS loads a binary into memory and links it on the fly before executing it.