Malware Analysis Advance Course


Overview
With the increased use of the Internet and the prevalence of computing systems in critical infrastructure, technology is undoubtedly a vital part of modern daily life. Unfortunately, the increasingly networked nature of the modern world has also enabled the spread of malicious software, or “malware”, ranging from annoying adware to advanced nationstate sponsored cyberweaponry. As a result, the ability to detect, analyze, understand, control, and eradicate malware is an increasingly important issue of economic and national security.
This Malware Analysis course will introduce students to modern malware analysis techniques and skills necessary to dissect malicious software in order to understand its mechanics and purpose. This course provides a holistic approach to dissecting malware.
Companies around the world are losing billions of dollars every year because of information security breaches usually caused by malware. The number of malware attacks grows yearly at an exponential rate. Malicious code or malware is a piece of code that intends to harm or disrupt the computer operation of the victim. If you want to understand how malware and cyber-attacks work, this is the right course for you. In this course, you will learn how to analyze malware and incidents that happened using the malicious code.
Learning Objectives
After completing this course, learners should be able to:
- How malware and Windows internals work
- How to create a safe and isolated lab environment for malware analysis
- What are the techniques and tools to perform malware analysis
- How to perform static analysis to determine the metadata associated with malware
- How to perform dynamic analysis of the malware to determine its interaction with the process, file system, registry and network
- How to perform code analysis to determine the malware functionality
- How to analyze downloaders, droppers, keyloggers, fileless malwares, HTTP backdoors, etc.
- Ability to acquire a memory image from suspect/infected systems
- Understanding of the techniques used by the malwares to hide from Live forensic tools
- Investigative steps for detecting stealth and advanced malware
- Techniques to hunt malwares
Requirements
-
Basics of operating systems (especially windows)
-
Basics of programming
-
Basics of networking protocols
-
Eagerness to learn
Who this course is for:
- People who would like to expand their knowledge in malware analysis
- Information and cybersecurity professionals and hobbyists
- Beginner reverse engineers
- People wanting to expand their knowledge and protect themselves against threats online
- System administrators, Software developers.
- Anyone interested in learning malware analysis and memory forensics.
- Incident Responders
- Digital Forensic Examiners
- Malware Analysts
- Penetration Testers who want to adapt Malware methods for their PT
- Reverse Engineers with 0 – 2 yrs of experience
- Cybersecurity Researchers and Students
Course content
- Introduction of Malware
- Types of Malware
- Malware Attack Big Famous Cases
- Effects of Malware on Your Computer
- Different way a Types of Malware Can Get into A System
- How Hackers Control System by Malware and Security
- How Attacker Bypass Your Anti-Virus by Malware
- Analysis of Malware from System
- Remove Malware Manually
- Weakness in Anti-virus
- Best Anti-virus And Firewall Implementation
- Malware Analysis
- Lab Setup for Malware Analysis
- Static Malware Analysis
- Dynamic Malware Analysis
- Types of Malware Analysis
- Behaviour Analysis
- Code Analysis
- Memory Forensics and Analysis
- Malware Detection
- Web Domain Analysis
- Network interactions Analysis
- Debugging & Debugger
- Analyses malicious URL’s
- Sandboxes Technique
- Tools for Malware Analysis
- Removing Malware on Your Computer
- Investigating Malware Cases
- Malware Prevention tip
- Countermeasures
Course Features
- Lectures 0
- Quizzes 0
- Duration 32 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes