Wishlist Share
Share Course
Page Link
Share On Social Media
Categories: Information Security

About Course

Malware Analysis Course

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking systems.

Malware analysis dissects malware to gather information about the malware functionality, how the system was compromised so that you can defend against future attacks. Assembly is a low-level language that is used to communicate with the machine. Assembly programming is writing human-readable machine codes or machine instructions that are directly read by the computer. All high-level languages compiled programs like C or C++ can be broken down, analyzed, and understood using Assembly language with the help of a debugger. This process is known as reverse engineering. Understanding what an executable program does is easy if you have direct access to the source code. But if not, such as the case with malware, learning Assembly can be helpful. In this course, through video demonstrations, hands-on reverse engineering, and capture-the-flag type activities, you will be introduced to the processes and methods for conducting malware analysis of different file types. You will analyze native executable files, and analyze popular files like PowerShell, JavaScripts, and Microsoft Office documents. Then you will learn the fundamentals of Assembly language, basic Win32 Assembly programming concepts, and how Reverse Engineers use Assembly to analyze malware.

Explore Other Online Courses

Show More

Course Content

Malware Analysis – Analyzing Using Real Malware Samples

  • Simple Static Analysis Of Document File for the beginner using Remnux Linux – MalwareAnalysis
    14:37
  • Static Analysis Of Document File: part 2 – Malware Analysis
    36:10
  • Static Analysis Of DocFile : Part 3 – Malware Analysis
    29:56
  • Static Analysis Of PDF File : Part 01 – MalwareAnalysis
    26:10
  • Static Analysis Of PDF File(using Remnux Linux) : Part 02 – MalwareAnalysis
    33:22
  • Static Analysis Of PE Files(using Remnux Linux & FlareVM) : Part 01 – MalwareAnalysis
    48:27
  • Unpacking Malicious File using UPX in Remnux Linux – Malware Analysis
    14:02
  • DynamicAnalysisDoneEasier-Part1
    25:10
  • Static Malware Analysis – .NET executable
    27:54
  • Malware Analysis – Identifying a Dropper
    21:09
  • Analysis of .Net Sample: Removing Protection & Introduction to Debugging
    32:07
  • Analysing Real World Sample – ASyncRAT
    22:19
  • Analysing Real Malware Sample(Debugging) – AsyncRAT (Part2)
    19:10
  • Bypassing IsDebuggerPresent using x32dbg
    18:10

Gophish Tutorial

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?