IFCI's Studies in Cybercrime: The Great SONY Hack of 2014
Learn to investigate the North Korean hackers who launched a devastating cyber attack against Sony Pictures in 2014.
Description
In November of 2014 an elite group of North Korean hackers executed a devastating cyber attack against Sony Pictures Entertainment in retaliation for their new movie, The Interview, a comedy depicting the assassination of Kim Jong Un. The attackers stole all of Sony's most private data and then strategically released it to the media. All of Sony's financial data, unreleased movies, and embarrassing e-mails mocking celebrities and the president of the United States. Furthermore, their malware destroyed Sony's computers, cutting off their access to their own data.
This attack grew from cyber terror to real terrorism as the story developed and it resulted in President Obama executing an executive order shifting US economic policy against North Korea. This was truly one of the most significant hacks in the history of Cybercrime.
This course will explain the attack in deep technical detail by analyzing the malware used by the North Koreans. Contained within these binaries is all the information Sony needs to understand how a worm spread throughout their network and destroyed their infrastructure. You will learn how Sony was victimized and what they could have done to prevent it. By the end of this course you will know more about this attack than the newscasters, more than top cyber security experts, and quite possibly more than Sony themselves.
What You Will Learn!
- Know more about the Sony hack than any of the newscasters and most cyber security experts
- Learn about in-depth malware analysis and how it can create real and immediately actionable cyber threat intelligence
- Learn about the history behind the Sony attack, the reasoning and methodologies behind it and the geopolitical impact it incurred
Who Should Attend!
- This course is appropriate for anyone interested in cybercrime, cyber security, malware analysis, or learning about one of the greatest hacks in history.
- The content is technical but students do not need to understand the technical methodology to understand the importance of the findings
- This course does not teach malware analysis in-depth. The instructor uses many analytic techniques that students can learn from but those students that wish to truly learn malware analysis or computer forensics should take the IFCI Expert Cybercrime Investigator's course, available on Udemy and at cybercrimeinvestigators.com.