Course Description

Artistic image of a transparent grey lock with a holographic blue and purple representation of a network

Malicious software is everywhere. Antivirus software is ineffective. How does malware behave? What are typical Indicators of Compromise? How can you determine if you are infected?  

This course covers malware analysis with the primary purpose of quickly uncovering the indicators of compromise (IOCs). Knowing malware IOCs allows you to detect and contain malware. An understanding of common malware tactics is vital, as most malware perform similar activities and access similar system files. Patterns begin to reveal themselves.  This course's primary objective is hands-on experience with malware analysis with the purpose of arming you with knowledge and skills to better understand and detect malware in the future.

Course Outline

  • Malware Analysis Environment
  • System (Behavioral) Level Reversing
  • Assembly Language Intro
  • Disassemblers and Debuggers
  • Buffer Overflow Attacks
  • DLL Injection
  • Code Level Reversing
  • Malware Obfuscation Techniques

Learner Outcomes

  • Create an isolated and controlled environment for analyzing malware
  • Use system level and code level reversing tools
  • Disassemble malicious software
  • Run malicious software in a debugger to understand its behavior
  • Assess stack overflow vulnerabilities and exploits
  • Recognize malware tactics and behavior
  • Familiarity with malware obfuscation tactics

Applies Towards the Following Certificates

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .