Getting Started with Malware Analysis
What you'll learn
- No previous experience in cyber-security? no problem I will start at the very beginning!
- Learn how to set up and configure a malware analysis lab - for free!
- Find all the important artifacts hidden inside a malware executable file.
- You'll instrument your system to collect all the events happening within your system and attribute these events to the malware's behavior.
Requirements
- You'll need to have access to a moderately equipped computer; nothing fancy. No need to spend all sorts of money trying out a new skill.
Description
There are many types of malicious software that are enabled by the wider use of the internet, portable media, mobile devices and embedded systems. This malicious software includes trojan horses, worms, viruses, botnets and spyware, ransomware and many more. In this course, students will be shown how to set up an analysis “laboratory” that will offer all the isolation and protection needed for safe dissection of malware, while being capable enough to deliver fast and accurate results.
After discussing the primary goals of malware analysis and offering a number of “pro-tips”, the instructor lays out a design for an analysis lab. Every step of building the lab is demonstrated in such a way as to enable and encourage students new to the field to be successful. Once the lab is operational, the process for dissecting malware samples is delivered in an interactive and hands-on manner, geared toward having the student complete the analysis within their own lab concurrent with the lesson being taught.
Even though the course lessons are demonstrated in a Microsoft Windows environment, users familiar with both Apple MacOS and Linux will be able to follow along as all the software in use available for all three platforms and at no cost.
Once the technique and tools used for malware analysis have been taught, malware samples are provided to the student for additional practice.
Who this course is for:
- People considering a career (or training) in cyber security.
- Computer users interested in exploring cybersecurity or malware analysis/reverse engineering.
- Developers who are interested in or thinking about starting to specialize in cybersecurity.
Instructor
Professor Steve H, Ph.D. has over 25 years in experience in the information technology and cyber security industry. His industry experience ranged from video game security to security operations in healthcare devices and services. Steve’s M.Sc. and Ph.D. are in the field of cybersecurity, and his undergraduate degrees are in computer science and engineering.