Advanced Malware Analysis: Redux
Offered By: Cybrary
Course Description
Overview
The Malware Analysis: Redux course equips participants to handle complex malware analysis tasks by reacquainting them with key analysis topics and exercises.
Prerequisites
Attendees should have a knowledge of malware analysis core concepts, a working malware analysis lab and a skill set in x86, x64 architecture and Windows APIs. A software development background is also recommended.
Course Goals
By the end of this course, students should be able to:
- Triage malicious software
- Understand the static and dynamic analysis process
- Decipher file formats
- Extract malware artifacts
- Understand malware’s functionality
- Learn about obfuscation techniques
- Debug malware
- Understand x86 and x64 Architecture
- Understand assembly language
- Learn about control structures
- Disassemble malware
- Unpack Malware
- Learn how to hunt for malware in memory
Syllabus
- RE Preparation
- Module 1 Objectives
- Reverse Engineering Process Review
- Malware Analysis Tools
- Malware Handling
- Malware Components Part 1: Windows OS
- Malware Components Part 2: PE Files and Memory
- Malware Components Part 3: WinAPI and Registry
- Malware Components Part 4: Malware Behaviors
- Module 1 Summary
- x86 & x64 Architecture
- Module 2 Objectives
- Numbering Systems
- Computer Architecture Part 1: x86/x64
- Computer Architecture Part 2: Assembly Language
- Computer Architecture Part 3: Control Flow and Stack
- Module 2 Summary
- Dynamic & Static Malware Analysis
- Module 3 Objectives
- Dynamic Analysis Process Part 1
- Dynamic Analysis Process Part 2
- Dynamic Analysis Process Part 3: Advanced Analysis
- Static Analysis Part 1
- Static Analysis Part 2
- Module 3 Summary
- Malware Challenges
- Module 4 Objectives
- Malware Packers Part 1
- Malware Packers Part 2
- Obfuscation Part 1
- Obfuscation Part 2: XOR
- Obfuscation Part 3: base64
- Identifying Encryption
- Anti-Analysis Part 1
- Anti-Analysis Part 2
- Module 4 Summary
- Memory Analysis
- Module 5 Objectives
- Forensics Process
- Memory Analysis Part 1
- Memory Analysis Part 2
- Module 5 Summary
- Course Summary
Taught by
Brian Rogalski
Related Courses
Application Security and MonitoringIBM via Coursera Application Security for Developers and DevOps Professionals
IBM via Coursera Malware Analysis and Assembly Language Introduction
IBM via edX Intro to Malware Analysis and Reverse Engineering
Cybrary RIP : Rétro-Ingénierie de Programmes
Université de Lille via France Université Numerique