Malware analysis and reverse engineering
3.7 (27 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
429 students enrolled

Malware analysis and reverse engineering

Learn how to analyse and fight malicious code, such as viruses, worms, trojans, or ransomware. Become malware analyst!
3.7 (27 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
429 students enrolled
Created by Nikola Milosevic
Last updated 8/2019
English [Auto]
Current price: $14.99 Original price: $24.99 Discount: 40% off
8 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 1 article
  • 10 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Topology of malware (what is virus, Trojan, worm, ransomware, rootkit, etc.)
  • How to reverse engineer software in general
  • How to perform static and dynamic analysis of malware
  • History of malware (from Brain.A to Stuxnet and beyond)
  • How to build signatures to stop malware
  • How to use artificial intelligence and machine learning in malware analysis
  • Basics of operating systems (especially windows)
  • Basics of programming
  • Basics of networking protocols
  • Eagerness to learn

Every cyber-attack utilizes some malicious code and some malware. The average loss that a company suffers from a single malware attack is $2.4 million. Companies around the world are losing billions of dollars every year because of information security breaches usually caused by malware. The number of malware attacks grows yearly at an exponential rate. Malicious code or malware is a piece of code that intends to harm or disrupt computer operation of the victim. If you want to understand how malware and cyber-attacks work, this is the right course for you. In this course, you will learn how to analyse malware and incidents that happened using the malicious code.

This course is intended for anyone who wants to know how malware analysis and reverse engineering of software is performed. This course can train you for a career in any of the anti-virus companies around the world or can give you skills that you can use to analyse and stop breaches to the networks of organizations you work with.

The course is tough by Dr. Nikola Milosevic, a PhD in computer science with track record of publications and successful projects in information and cyber-security. Nikola is OWASP chapter and project leader and has been teaching on several reputable Universities over the past 5 years.  I have also published scientific papers on malware analysis. Now he wants to share this knowledge with you and help you develop your career!

This course will teach you the following:

  • History of malware and malicious software on PC (from Brain.A to Stuxnet and further)

  • The topology of malware (you will learn what is virus, worm, Trojan, rootkit, ransomware, mobile malicious code, etc.)

  • How malicious software work and propagate, how they use exploits

  • How to build your own malware analysis lab

  • How to perform static and dynamic malware analysis

  • How to apply your skills to reverse engineer non-malicious software and gain insight into how they operate

  • How AI and machine learning can help to detect malware

In this course, you will also learn how to fingerprint malware and use tools like WinMD5, Strings, PEid, Dependency Walker, Resource Hacker, WinHex, OllyDbg, IDA Pro, Process Monitor, Process Explorer, RegShot, Wireshark, NetCat, etc.

The course does not require any particular previous knowledge, apart from your apatite to learn and basics of networking, how operating systems work and a tiny bit of programming. However, if you are versed in computer science and interested in security, this is the right course for you.

Go ahead and enroll!

Who this course is for:
  • People who would like to expand their knowledge in malware analysis
  • Information and cyber security professionals and hobbyists
  • Beginner reverse engineers
  • People wanting to expand their knowledge and protect themselves against threats online
Course content
Expand all 7 lectures 03:35:08
+ Introduction
1 lecture 01:08:07

In the first lecture we dig into the topology and kinds of malware (explore what is virus, Trojan, worm, ransomware, rootkit, mobile malware code, combination malware) and we explore how malware developed and changed over time.

Preview 01:08:07
+ Static malware analysis
2 lectures 01:04:48

In this part we explore what are the different approaches to malware analysis and dig deep into static malware analysis. We discuss what information we can get from Strings, linked DLLs, function and API calls that can be retrieved. Also we introduce tools such as PEiD, DependencyWalker, IDA Pro and others that can help in static analysis

Static malware analysis - theory

This lectures does hands-on walk through of couple of tools in a virtual environment and shows how to statically analyse malware using these tools.

Static malware analysis - demo
+ Dynamic malware analysis
2 lectures 58:10

This lecture takes us through the techniques for dynamic or behavioral malware analysis. We explore how to set up the malware analysis lab, how to isolate it and how to use tools to capture the malware actions (process logs, network logs, registry logs) as well as what kind of debuggers can be used and in which way.

Dynamic malware analysis

In this lecture we'll have a look at tools that help performing dynamic malware analysis, such as Wireshark, RegShot, ProcMon, and Process Explorer.

Dynamic malware analysis - demo
In this assignment you will be creating your malware analysis lab for analyzing some windows malware that were attached with previous lectures. The goal of the assignment is to analyse and figure out what these malware samples do.
Perform analysis of attached malwares and
2 questions
+ Security and AI
1 lecture 23:57

This lecture gives a short overview how artificial intelligence (AI) and machine learning can help automate analysis of software and malware detection.

Security and AI
+ Additional resources
1 lecture 00:05

In this section we will have a look at some additional resources that will help you understand how malware and malware analysis worlds function.

Lecture 7: Additional things