Summary
In this chapter, we learned a lot about malware analysis, but more importantly, about how we can gather and understand the outputs from the tools used for the analysis.
While malware analysis is mostly performed by a specialized team (with specialized tools and environments), the knowledge obtained about this process has given you the skills to better manage a global cybersecurity strategy like a pro!
Now, it's time to move on to another exciting chapter in which we will learn how to leverage pentesting tools and techniques in defensive security.