Students execute malware in a controlled sandbox while monitoring registry changes, file system modifications, and network requests. They learn to use process monitors and network sniffers to record behavior.

Similar Lessons