Focuses on the architecture of a secure, isolated malware analysis lab and the execution of dynamic analysis techniques to capture Indicators of Compromise (IOCs).

Similar Lessons