Tracking Malware: IOCs and Hashing

Subscribers:
577,000
Published on ● Video Link: https://www.youtube.com/watch?v=zX14GGtn5uU



Duration: 3:33
12,377 views
395


This is the introduction video for a potential tutorial series on various cybersecurity concepts.

This video aims at getting you acquainted with the general terminology used when talking about malware and answers questions like, How do you find malware for testing? how do you look for a specific threat, how do you track it?

Topics covered: Indicators of Compromise and Hashing

https://en.wikipedia.org/wiki/MD5
https://en.wikipedia.org/wiki/Cryptographic_hash_function
https://en.wikipedia.org/wiki/SHA-1

-------------------------------------------

Thanks for watching! If you like what you see, check out the links below.

Patreon: https://www.patreon.com/tpsc
Forum: https://forum.thepcsecuritychannel.com/
Twitter: https://twitter.com/leotpsc
Facebook: https://www.facebook.com/tpscyt







Tags:
TPSC
The PC Security Channel
Security
Internet Security
Antivirus
Reviews
Security software reviews
test
malware
prevention
detection
removal
antimalware
tutorial
virus
trojan
2017
Malware Tracking
Tracking Malware
Where to find malware for testing
Malware samples
Malware samples for testing
IOCs
IOC
Hashing
MD5
SHA1
SHA256
cryptography
hash functions