Malware Analysis Course for IT Security
2.8 (19 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
131 students enrolled

Malware Analysis Course for IT Security

Analyzing Malware, Trojans and Viruses
2.8 (19 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
131 students enrolled
Created by Ronit Yadav
Last updated 4/2017
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 41 mins on-demand video
  • 3 articles
  • 12 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Dissect and Analyzing Malware, Trojan and Viruses in Real Environment
  • Tools and Techniques used for Reverse Engineering Malware
  • Sound Knowledge of Debuggers, Disassembler & Assembly Language

Malware Analysis Course for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen's interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen's code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner

Features of this Course:

  • You will learn How to use System Monitoring Tools
  • Disassembling and Debugging with IDA and Olly
  • Monitoring Network with Wireshark
  • Analyzing Office Documents

Powerful Skills Every Info Tech needs

You will learn the art of analyzing Malware in a Real Environment , The course is Divided into Two Parts , In the first Half You will learn to analyze Malware's Behavior with all Core tools and we follow a Simple Approach, In the Second half I you will learn something Different from the first half, You will learn to analyze Microsoft Office Documents for Embedded malware and Macros

Who this course is for:
  • IT SECURITY, Students, IT Managers, professionals, Auditors, security professionals & anyone who is concerned about the integrity of the network infrastructure.
Course content
Expand all 13 lectures 44:21
+ Lab Set-up
3 lectures 07:47

This is a short video on Course Module. Throughout the Course we are going to Follow a Simple Approach that will help you to Analyze Malware in a safe Environment 

Preview 01:39

After Watching these Video you will find it easy to Set-up your own Lab to analyze any Species Malware

and Protecting your System against Corruption caused by Malware and Restore your System to a Pristine State

Lab Set-up

In this Video you will learn how to create a snapshots,Restore a snapshots & how to delete it and Even other Freely and Paid available softwares for protection

Restoring System State
+ Part 1- Analysing Malware Behavior
3 lectures 10:01

In this video You will Learn how to make Use of System Monitoring tools for Malware Analysis Purpose. A very Simple and Easy to Learn Demonstration where I will show you Behavioral Analysis Approach in Action

Analysing with Monitoring Tools

From this video You will learn How to Monitor Network Activity, What application to use while analyzing a Malware's Network Activity, How to Setup tools and their Configuration in Lab and various Services like HTTP, IRC etc, and how to respond their Request

Analysing Lab Network

In this Article I will discuss the behavior of the Mysterious File, Basically you might have noticed the Malware's Behavior before and after this file. Hope you Enjoyed...Keep Practicing !

Moving on to Mysterious File
+ Part 2-Code Analysis
3 lectures 22:12

Before you actually start hammering away Code analysis, take a look at Ollydbg essential, from this video you will the Essentials of Ollydbg aka Olly and all its Features like 

  • CPU Window
  • Registers
  • Stack Windows
  • Hex dump
  • Information on Sizes
  • Controlling program Execution

Preview 08:13

In this video We will have a quick look at the Inner Encryption of the Malware and I will show you how to tackle such situation and Decrypt such Obfuscation

Analysing Inner Encryption of the Malware

From this Video you will learn the Technique of Decrypting the Mysterious file using Ollydbg and IDA, In order to analyze the malware in Ollydbg and IDA you don't have to be an Assembly Expert

Analysing & Decrypting Mysterious File
+ Hands-On Exercise
1 lecture 00:16

This Exercise is For you , Please don't search on Internet for the solution. This is a very simple Malware which behaves differently than one which I have analyzed previously

Hands-On Exercise
+ Malware Analysis-Office Documents
2 lectures 02:48

This article is about Analyzing Microsoft documents for Embedded Malwares and Trojans, This is a Traditional way of Hacking Computer by Embedding payload in a document Macros. Basically macros are script which are to automate your Task, but Hackers and Intruders use this features to Inject VBA Payloads in Macros, This video will you to safeguard your computer and Home Netwok

Preview 01:53

This is last Video of the course , I discussed a Brief summary of the course , Hope you people Enjoyed Learning this Course.

Preview 00:55