YoVDO

Advanced Malware Analysis: Redux

Offered By: Cybrary

Tags

Malware Analysis Courses Reverse Engineering Courses Assembly Language Courses x86 Architecture Courses Dynamic Analysis Courses Static Analysis Courses Memory Forensics Courses

Course Description

Overview

The Malware Analysis: Redux course equips participants to handle complex malware analysis tasks by reacquainting them with key analysis topics and exercises.

Prerequisites

Attendees should have a knowledge of malware analysis core concepts, a working malware analysis lab and a skill set in x86, x64 architecture and Windows APIs. A software development background is also recommended.

Course Goals

By the end of this course, students should be able to:

  • Triage malicious software
  • Understand the static and dynamic analysis process
  • Decipher file formats
  • Extract malware artifacts
  • Understand malware’s functionality
  • Learn about obfuscation techniques
  • Debug malware
  • Understand x86 and x64 Architecture
  • Understand assembly language
  • Learn about control structures
  • Disassemble malware
  • Unpack Malware
  • Learn how to hunt for malware in memory

Syllabus

  • RE Preparation
    • Module 1 Objectives
    • Reverse Engineering Process Review
    • Malware Analysis Tools
    • Malware Handling
    • Malware Components Part 1: Windows OS
    • Malware Components Part 2: PE Files and Memory
    • Malware Components Part 3: WinAPI and Registry
    • Malware Components Part 4: Malware Behaviors
    • Module 1 Summary
  • x86 & x64 Architecture
    • Module 2 Objectives
    • Numbering Systems
    • Computer Architecture Part 1: x86/x64
    • Computer Architecture Part 2: Assembly Language
    • Computer Architecture Part 3: Control Flow and Stack
    • Module 2 Summary
  • Dynamic & Static Malware Analysis
    • Module 3 Objectives
    • Dynamic Analysis Process Part 1
    • Dynamic Analysis Process Part 2
    • Dynamic Analysis Process Part 3: Advanced Analysis
    • Static Analysis Part 1
    • Static Analysis Part 2
    • Module 3 Summary
  • Malware Challenges
    • Module 4 Objectives
    • Malware Packers Part 1
    • Malware Packers Part 2
    • Obfuscation Part 1
    • Obfuscation Part 2: XOR
    • Obfuscation Part 3: base64
    • Identifying Encryption
    • Anti-Analysis Part 1
    • Anti-Analysis Part 2
    • Module 4 Summary
  • Memory Analysis
    • Module 5 Objectives
    • Forensics Process
    • Memory Analysis Part 1
    • Memory Analysis Part 2
    • Module 5 Summary
    • Course Summary

Taught by

Brian Rogalski

Related Courses

Application Security and Monitoring
IBM via Coursera
Application Security for Developers and DevOps Professionals
IBM via Coursera
Malware Analysis and Assembly Language Introduction
IBM via edX
Intro to Malware Analysis and Reverse Engineering
Cybrary
RIP : Rétro-Ingénierie de Programmes
Université de Lille via France Université Numerique