Course Description

Artistic image of a transparent grey lock with a holographic blue and purple representation of a network

You will analyze and reverse engineer malicious software in this entry-level course. Begin by configuring an environment for safe malware analysis, learn how to discover indicators of compromise (IOCs) quickly, then conduct a behavioral analysis.

You will apply the tools and techniques you learn to real-world malware samples, where you will identify common malware characteristics used by bots, keyloggers, rootkits and worms.

Course Outline

This is an 18-hour course.
  • Malware Categories, Signatures and Analysis Goals
  • Advanced Persistent Threat (APT) Detection
  • Import Hashing and Context Piecewise Hashing
  • Strings and Character Encoding
  • DLL Hijacking
  • File Formats, Portable Executable Formats and Dynamic Link Libraries
  • Registry Modification and File System Manipulation
  • Network Traffic Analysis

Learner Outcomes

At the end of this course, you will be able to:

  • Create an isolated and controlled environment for analyzing malware
  • Use system level and code level reversing tools
  • Disassemble malicious software
  • Run malicious software in a debugger to understand its behavior
  • Assess stack overflow vulnerabilities and exploits
  • Recognize malware tactics and behavior
  • Understand malware obfuscation tactics


Learn about more cybersecurity topics here


It is recommended that you have a general knowledge of computer, networking and operating system fundamentals. Experience with malware, assembly language and programming is preferred.

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .