Expert Malware Analysis and Reverse Engineering
3.0 (33 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
220 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Expert Malware Analysis and Reverse Engineering to your Wishlist.

Add to Wishlist

Expert Malware Analysis and Reverse Engineering

Beginner to Expert series on Malware analysis and reverse engineering concepts.
3.0 (33 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
220 students enrolled
Created by Abhinav singh
Last updated 3/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
What Will I Learn?
  • Understand cyber kill chain and how it applies to a malware attack life cycle.
  • Perform Static as well as dynamic analysis of complex malwares and payloads.
  • Analyze various file formats like Doc, PDF, Java, Flash etc. to uncover the hidden codes within them.
  • Understand Assembly language basics and how it can be applied to manually read the reverse engineered codes of malware.
  • Deep understanding of various tools and techniques involving reverse engineering and static malware analysis.
View Curriculum
Requirements
  • Basics of Assembly language, Computer Applications and introductory idea of how malwares work.
Description

Malware analysis is a critical skill in the information security community. This course is logically designed to help you leap through the complicated steps of static and dynamic malware analysis in an easy and proactive way. After this course, you will be able to understand the core skills required in malware incident response investigations and analysis of Advance persistent threats. The course will guide you trough the basic requirements and necessary skillsets required in order to take your knowledge to the next level. 

Some of the key take a-ways from this course are:

  • Over 4 hours of content purely focused on key skills required for effective analysis of web threats.
  • Fully interactive and community driven course.
  • Static and Dynamic malware analysis and its various steps.
  • File format analysis of standard formats like PDF, Flash, Word, Excel etc.
  • Understanding the Cyber kill chain and how it applies to malware attack life cycle.
  • Deep understanding of relevant tools that can help in uncovering complex malware traits.
  • Basics of Reverse Engineering and how we can analyze advance malware behavior using it.
  • Incidence response and report generation skills for information security professionals.

You can post your queries and doubts in the course and I will be more than happy to help you in your learning curve. 

Who is the target audience?
  • Beginners, security engineers/analyst, malware enthusiasts and advance security researchers.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
21 Lectures
02:00:49
+
Course Introduction & Overview of Cyber Kill chain
6 Lectures 14:41

This video will give you an overview on how this course is structured and how you can utilize the Question and Answers section to post your doubts and queries. Additional reading materials and links will also be posted with each video.

Preview 01:01

Hardware and software requirements for this video series.

Preview 02:33

This video will guide you through resources that will help you in setting up your own malware testing lab. This step is essential to make sure that you do not fun malicious files on your main machine. 

Preview 02:24

This video gives a quick introduction to REMnux linux distro.

Preview 01:43

+
Beginning with Malware Analysis
9 Lectures 01:11:44

This video talks about the first two stages of kill chain and how an attacker uses the information in attacking the target.

Reconnaissance and Weaponization - The Pre-Attack Phase
03:50

This video will introduce you to spear phishing mails and how it is used as an effective delivery mechanism to drop malwares onto the target systems.

Delivery & Exploitation Phase - Using Spearphishing emails
04:04

This lecture is a video demonstration on how we can do initial analysis of spear-phishing emails and how to make sense of email header data.

Analyzing Malicious Email headers - Part 1
02:56

This lecture is a video demonstration on how we can do initial analysis of spear-phishing emails and how to make sense of email header data.

Analysing Malicious email - Part 2 (summary)
01:28

This video will guide you through analyzing malicious office files that are used as weaponized files with spearphishing emails.

Analyzing malicious Office Files (Doc, PPT, XLS)
10:32

In this video we will watch a demo on how we can analyze and debug complex macros using macro debugging in office itself. 

Office File Macro Analysis through Debugging - Demo
23:10

This video will help us in understanding how we can dissect a weaponized PDF file in order to trace the hidden malicious behaviour inside it. The tool used in this video is PDFStream Dumper. 

Analyzing Malicious PDF Files - Part 1
11:16

This video will cover more advanced malicious PDF files and how we can analyze them. 

Analyzing Malicious PDF Files - Part 2
07:55

This video covers remnux OS and its various tools that can help un in analyzing PDF files. the samples used in this demo are same as the previous ones. 

Analyzing Malicious PDF Files - Part 3
06:33
+
Network based analysis and Forensics
6 Lectures 34:24

This lecture covers the basics of drive-by downloads and some of its most common examples. It also highlights the techniques used in drive-dy download attacks which makes it one of the most successful attack vectors.

Understanding Drive-by Downloads as delivery attack vector
02:06

This video will introduce you to the most powerful network analysis tool called wireshark. 

Getting Started With Wireshark
02:17

This video contains a demo of the common features of wireshark packet analysis tools. 

Wireshark Basics Demo
14:07

This video will give a brief introduction to how exploit kit redirection works. This will help in building a ground work for future advance videos. 

Understanding Exploit kit redirection chain
02:57

Understanding Exploit kit through Network captures(Pcaps)
08:03

In this video we will see how Fiddler can be used as a tool to analyze exploit kit traffic and its redirection chain to understand the infection cycle. 

Exploit kit Analysis using Fiddler
04:54
About the Instructor
Abhinav singh
3.1 Average rating
77 Reviews
638 Students
2 Courses
Security researcher

Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of Information Security and has adopted it as his full time profession. His core work areas include Malware Analysis, Network Security, System and Enterprise Security. He is also the author of "Metasploit Penetration Testing Cookbook" and "Instant Wireshark" published by Packt. Abhinav's work has been quoted in several InfoSec magazines and portals.