Malware Analysis Expert - Analyzing Malwares from the core
3.5 (71 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,807 students enrolled

Malware Analysis Expert - Analyzing Malwares from the core

A Hackers Guide to Malware Analysis. Learn how to analyse malware from basics. This course will cover everything !
3.5 (71 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,807 students enrolled
Last updated 12/2018
English
English
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 1 article
  • 17 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Malware behavior analysis
  • Reverse Engineering
  • Gather Advanced dynamic and static malware analysis
  • Learn to use tools like OllyDbg, IDA Pro, WINDBG
  • Know how to detect and defend from malwares
  • Types of malware and their characteristics and other basic stuff.
Requirements
  • Free Tools will be provided
  • Internet (You probably have one)
  • Everything will be provided in the course and all tools will be free
Description

You're here because you're an ethical hacker, penetration tester, digital forensics expert, system administrators, IT admins or any random person who loves computers and likes to interact with them and learn more by exploring malware. This course is for you because this is a beginners to pro i.e. zero to hero course. A complete course with basics from what are malware to how to de-compile them and analyse files if they are malware and find the source of the file. A bundle course with free malware samples and all the tools required are free.

I'm here because I'm the answer to all your questions. I would love to share my secrets and knowledge with you and help you guys to setup an environment for your need and teach you everything you need !

Welcome to OneLit Malware Analysis Expert

  • Malware Analysis Expert !

I will also provide proper guidance to start from zero. Most people have problems with starting and don't know where and what to study. The course is for beginners and advance and is divided into parts which will first explain all the theoretical parts and then start with practical video screen recordings while analyzing malware.

  • Certification!

OneLit Certifications are recognized world wide and once you have completed the course, you will be given a certification called 'OLMAE' i.e. OneLit Certified Malware Analysis Expert.

  • We’ve left no stone unturned. 

I guarantee, this is THE most thorough, laser-focused and up-to-date course available ANYWHERE on the market - or your money back. There are zero courses available on the internet on how to analyze malwares with this lazer-focused teaching and step by step instructions.

  • Every malware is different!

We all know that we have different malware and types of infections. In this course will explore most of them and every malware sample different. Samples are provided with the course.

Why Malware Analysis  ?

Organizations are facing problems and the cause is unknown and many of them don't even know the source of infection or anti-viruses are used to detect problems. The main problem with them is they don't canalize files i.e. they cannot detect viruses, backdoors, rootkits which are custom crafted. Anti-Viruses or Anti-Malware software have database and signature which are used to scan for viruses but a newly developed virus is not detected and thus it is required to manually analyze viruses and malwares

Who this course is for:
  • Security Professionals
  • Ethical Hackers
  • Penetration Testers (VAPT Experts)
  • Digital Forensics Experts
  • Server Administrators
  • IT Heads
Course content
Expand all 31 lectures 01:21:21
+ 2. Everything you need to know
5 lectures 06:20

In this video, we will be talking about malware. We will see a small definition of malware and the characteristics of malware.

2.1 Malware
01:36
2.2 Replicator
01:17
2.3 Concealer
01:11
2.4 Bomb
01:15
2.5 What is Malware Analysis
01:01
+ 3. Types of Malware
8 lectures 10:29
3.1 Viruses
01:11
3.2 Trojans
01:09
3.3 Worms
01:01
3.4 Rootkits
00:44
3.5 Adwares
00:56
3.6 Ransomware
00:56
3.7 Backdoors
01:01
3.8 Malware Infection Statistics
03:31
+ 4. Methodology of Malware Analysis
4 lectures 04:13
4.1 Manual Code Reversing
00:58
4.2 Interactive Behavior Analysis
01:01
4.3 Static Properties Analysis
00:58
4.4 Automated Analysis
01:16
+ 5. Setting Up Lab
4 lectures 17:08

In this video we will be talking about virtualbox and virtualization in general and then we wills tart installing virtualbox on our system to setup our malware analysis lab.

Preview 02:16

Since many people faced issues with downloading FlareVM, this is the second 2019 method of installing flareVM by manually use powershell and downloading FlareVM from github.

Preview 04:06
+ 6. Dynamic Malware Analysis
3 lectures 15:01

As explained in our previous video, in this video, we will be analyzing processes and running malware for dynamically analyzing them.

6.1 Dynamic Malware Analysis of Processes
06:06

In this video, we will be analyzing the network for connections by executing the malware.

6.2 Dynamic Malware Analysis of Network
05:31

In this lecture we will be analyzing registries after executing the software or malware i.e. Dynamically analyzing malware.

6.3 Dynamic Malware Analysis of Registry
03:24
+ 7. All about debuggers
2 lectures 11:07
7.1 Debuggers and Key terms.
03:04

In this video, we will be learning about ollyDbg which is the most common debugger and widely used among analyst. We will be practically taking a look at ollydbg.

7.2 Working with OllyDbg
08:03
+ 8. Static Malware Analysis
3 lectures 13:45

In this video, we will learn a bit about x86 architecture i.e. 32 bit architecture and a bit about assembly language.

8.1 x86 Architecture and Assembly language.
05:11

In this video, we will be using hex editors to analyze binded malwares i.e. malware binded with mp4, mp3, jpg, jpeg, png files. In our Metasploit expert course, We have seen how to bind malware and backdoors to mp4 and jpg files and even xls files.

8.2 Analyzing Binded Multimedia Malware using Hex-Editors.
04:17

In this section, we will be extracting malware binaries i.e. dlls and required to run the malware.

8.3 Extracting malware binaries.
04:17
+ 9. BONUS !
1 lecture 00:01

Big surprise for all my students

BONUS !!
00:01