YoVDO

Malware Analysis: Assembly Basics

Offered By: Pluralsight

Tags

Reverse Engineering Courses Assembly Language Courses Malware Analysis Courses Ghidra Courses IDA Pro Courses Number Systems Courses Control Structures Courses Low-level Programming Courses CPU Architecture Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learning tools such as IDA Pro and Ghidra starts with understanding assembly. This course will teach you the basics of the assembly language to get started as a reverse engineer!

Reverse engineering unlocks the hidden world of malware, revealing its true intentions and providing irrefutable evidence. In this course, Malware Analysis: Assembly Basics, you'll be equipped with the foundational knowledge of assembly language, the key to wielding powerful tools like IDA Pro and Ghidra. First, you’ll demystify machine code and understand why reverse engineering is essential for malware analysis. You’ll become familiar with low-level instructions and how the CPU operates. Next, you’ll learn how to recognize common data and control structures in assembly, allowing you to identify key program functionality. Finally, you’ll solidify your understanding by building simple assembly programs yourself. When you’re finished with this course you’ll have the skills and knowledge necessary to begin your journey to become a reverse engineer.

Syllabus

  • Course Overview 1min
  • Demystifying CPU Architecture and Number Systems 24mins
  • Learning the Building Blocks of Assembly 26mins
  • Common Code Structures 36mins

Taught by

Josh Stroschein

Related Courses

¡A Programar! Una introducción a la programación
University of Edinburgh via Coursera
Building Services with ASP.NET Web API
Board Infinity via Coursera
計算機程式設計 (Computer Programming)
National Taiwan University via Coursera
Fundamentals of C++
IBM via edX
Intro to Python
Cabrillo College via California Community Colleges System