Malware Analysis Introduction
4.0 (11 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,016 students enrolled

Malware Analysis Introduction

Analyzing hackers malware
4.0 (11 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,016 students enrolled
Created by Alex Thomas
Last updated 12/2018
English
English [Auto-generated]
Current price: $11.99 Original price: $19.99 Discount: 40% off
3 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Reverse engineer malware
  • Spot malware using common windows API functions

  • Use static analysis techniques

  • Use dynamic analysis techniques
  • Create a simple keylogger in C
Requirements
  • Never run malware on your host machine, use a virtual machine.
  • Know how to use vmware or somthing similar, this will be used to execute the malware. NEVER RUN MALWARE ON YOUR HOST MACHINE!
  • A little Windows API knowledge
  • A little IDA experience
  • A little Wireshark experience
  • A little programming knowledge
Description

Malware is everywhere and the industry is desperate for people who can track the hackers. In this course, you will learn about the various types and categories of malware, their symptoms, and how they work. As an incident responder, it is imperative that you are able to properly dissect malware 

In this course, you will learn how to perform the basics of dynamic malware analysis, a tried and true method of understanding what an unknown binary (malware) is doing on an infected system. You will learn the tools, tactics and techniques malware analysis use in there every day job. At the end of the course I will walk you through creating your own piece of malware. The saying goes "it takes a thief to catch a thief".

So, if you have ever wondered how to better understand malware, this is the course for you!

Who this course is for:
  • Any one interested in malware
Course content
Expand all 17 lectures 01:49:45
+ Tools Installation
6 lectures 05:22
PEstudio
00:40
Process Monitor
00:43
Registry Snapshot
01:29
Fake network
00:49
IDA
00:55
+ Static analysis
4 lectures 45:32
Static analysis overview
06:14
Strings
05:30
PEstudio
21:43

Use your knowledge to answer some questions. You might have to google a few of them.

Static Analysis
5 questions
Use your new skills to analyze a piece of malware
Static Analysis Practice
5 questions
+ Dynamic analysis
4 lectures 25:58
Dynamic Analysis overview
05:36
Process Monitor
12:34
Registry Snapshot
04:49
Fake network
02:59

Use your knowledge to answer some questions. You might have to google a few of them.

Dynamic Analysis
4 questions
Use your new skills to analyze a piece of malware
Dynamic Analysis Practice
4 questions