Never run malware on your host machine, use a virtual machine.
Know how to use vmware or somthing similar, this will be used to execute the malware. NEVER RUN MALWARE ON YOUR HOST MACHINE!
A little Windows API knowledge
A little IDA experience
A little Wireshark experience
A little programming knowledge
Malware is everywhere and the industry is desperate for people who can track the hackers. In this course, you will learn about the various types and categories of malware, their symptoms, and how they work. As an incident responder, it is imperative that you are able to properly dissect malware
In this course, you will learn how to perform the basics of dynamic malware analysis, a tried and true method of understanding what an unknown binary (malware) is doing on an infected system. You will learn the tools, tactics and techniques malware analysis use in there every day job. At the end of the course I will walk you through creating your own piece of malware. The saying goes "it takes a thief to catch a thief".
So, if you have ever wondered how to better understand malware, this is the course for you!
My name is Alex Thomas. I have been a professional pentester for three years and have a Masters degree from Dakota State University. I first started down the security path when I was a teenager by participating in CTFs. In my spare time I enjoy programing, building robotics, and of course playing CTF and bug bounties.