IFCI's Studies in Cybercrime: The Great SONY Hack of 2014
4.6 (29 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
181 students enrolled

IFCI's Studies in Cybercrime: The Great SONY Hack of 2014

Learn to investigate the North Korean hackers who launched a devastating cyber attack against Sony Pictures in 2014.
4.6 (29 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
181 students enrolled
Created by Brian Hussey
Last updated 1/2015
English
English [Auto]
Current price: $23.99 Original price: $34.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Know more about the Sony hack than any of the newscasters and most cyber security experts
  • Learn about in-depth malware analysis and how it can create real and immediately actionable cyber threat intelligence
  • Learn about the history behind the Sony attack, the reasoning and methodologies behind it and the geopolitical impact it incurred
Requirements
  • A technical / cyber security background is useful but not required
  • Successful graduates of the IFCI Expert Cybercrime Investigator course will get the most benefit from this course
Description

In November of 2014 an elite group of North Korean hackers executed a devastating cyber attack against Sony Pictures Entertainment in retaliation for their new movie, The Interview, a comedy depicting the assisination of Kim Jong Un. The attackers stole all of Sony's most private data and then strategically released it to the media. All of Sony's financial data, unreleased movies, and embarrassing e-mails mocking celebrities and the president of the United States. Furthermore, their malware destroyed Sony's computers, cutting off their access to their own data.

This attack grew from cyber terror to real terrorism as the story developed and it resulted in President Obama executing an executive order shifting US economic policy against North Korea. This was truly one of the most significant hacks in the history of Cybercrime.

This course will explain the attack in deep technical detail by analyzing the malware used by the North Koreans. Contained within these binaries is all the information Sony needs to understand how a worm spread throughout their network and destroyed their infrastructure. You will learn how Sony was victimized and what they could have done to prevent it. By the end of this course you will know more about this attack than the newscasters, more than top cyber security experts, and quite possibly more than Sony themselves.

Who this course is for:
  • This course is appropriate for anyone interested in cybercrime, cyber security, malware analysis, or learning about one of the greatest hacks in history.
  • The content is technical but students do not need to understand the technical methodology to understand the importance of the findings
  • This course does not teach malware analysis in-depth. The instructor uses many analytic techniques that students can learn from but those students that wish to truly learn malware analysis or computer forensics should take the IFCI Expert Cybercrime Investigator's course, available on Udemy and at cybercrimeinvestigators.com.
Course content
Expand 10 lectures 01:32:15
+ The Great Sony Hack of 2014
10 lectures 01:32:15
PEStudio Analysis of Destover.C
11:40
PEStudio Analysis of Destover.A
05:24
Decoding XOR Strings from Internal Destover Structure
11:00
Binary Patching with OllyDbg
07:32
Dynamic Analysis of Destover.C
07:02
Malicious Artifact Analysis of Destover.C
15:34
Destover Command & Control Server Investigation
05:46
Destover Boot Sector Rewrite and Wrap-up
05:05