Malware Analysis Course for IT Security
2.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
29 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Malware Analysis Course for IT Security to your Wishlist.

Add to Wishlist

Malware Analysis Course for IT Security

Analyzing Malware, Trojans and Viruses
2.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
29 students enrolled
Created by Ronit Yadav
Last updated 4/2017
English
Curiosity Sale
Current price: $10 Original price: $150 Discount: 93% off
30-Day Money-Back Guarantee
Includes:
  • 41 mins on-demand video
  • 3 Articles
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Dissect and Analyzing Malware, Trojan and Viruses in Real Environment
  • Tools and Techniques used for Reverse Engineering Malware
View Curriculum
Requirements
  • Sound Knowledge of Debuggers, Disassembler & Assembly Language
Description

Malware Analysis Course for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen's interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen's code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner

Features of this Course:

  • You will learn How to use System Monitoring Tools
  • Disassembling and Debugging with IDA and Olly
  • Monitoring Network with Wireshark
  • Analyzing Office Documents


Powerful Skills Every Info Tech needs

You will learn the art of analyzing Malware in a Real Environment , The course is Divided into Two Parts , In the first Half You will learn to analyze Malware's Behavior with all Core tools and we follow a Simple Approach, In the Second half I you will learn something Different from the first half, You will learn to analyze Microsoft Office Documents for Embedded malware and Macros

Who is the target audience?
  • IT SECURITY, Students, IT Managers, professionals, Auditors, security professionals & anyone who is concerned about the integrity of the network infrastructure.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Introduction To Malware Analysis Course
1 Lecture 01:16

In this Video I have shared my Profile and the Course Introduction 

Preview 01:16
+
Lab Set-up
3 Lectures 07:47

This is a short video on Course Module. Throughout the Course we are going to Follow a Simple Approach that will help you to Analyze Malware in a safe Environment 

Preview 01:39

After Watching these Video you will find it easy to Set-up your own Lab to analyze any Species Malware

and Protecting your System against Corruption caused by Malware and Restore your System to a Pristine State

Lab Set-up
03:09

In this Video you will learn how to create a snapshots,Restore a snapshots & how to delete it and Even other Freely and Paid available softwares for protection

Restoring System State
02:59
+
Part 1- Analysing Malware Behavior
3 Lectures 10:08

In this video You will Learn how to make Use of System Monitoring tools for Malware Analysis Purpose. A very Simple and Easy to Learn Demonstration where I will show you Behavioral Analysis Approach in Action

Analysing with Monitoring Tools
04:56

From this video You will learn How to Monitor Network Activity, What application to use while analyzing a Malware's Network Activity, How to Setup tools and their Configuration in Lab and various Services like HTTP, IRC etc, and how to respond their Request

Analysing Lab Network
04:19

In this Article I will discuss the behavior of the Mysterious File, Basically you might have noticed the Malware's Behavior before and after this file. Hope you Enjoyed...Keep Practicing !

Moving on to Mysterious File
00:53
+
Part 2-Code Analysis
3 Lectures 22:12

Before you actually start hammering away Code analysis, take a look at Ollydbg essential, from this video you will the Essentials of Ollydbg aka Olly and all its Features like 

  • CPU Window
  • Registers
  • Stack Windows
  • Hex dump
  • Information on Sizes
  • Controlling program Execution



Preview 08:13

In this video We will have a quick look at the Inner Encryption of the Malware and I will show you how to tackle such situation and Decrypt such Obfuscation

Analysing Inner Encryption of the Malware
06:29

From this Video you will learn the Technique of Decrypting the Mysterious file using Ollydbg and IDA, In order to analyze the malware in Ollydbg and IDA you don't have to be an Assembly Expert

Analysing & Decrypting Mysterious File
07:30
+
Hands-On Exercise
1 Lecture 00:16

This Exercise is For you , Please don't search on Internet for the solution. This is a very simple Malware which behaves differently than one which I have analyzed previously

Hands-On Exercise
00:16
+
Malware Analysis-Office Documents
2 Lectures 02:55

This article is about Analyzing Microsoft documents for Embedded Malwares and Trojans, This is a Traditional way of Hacking Computer by Embedding payload in a document Macros. Basically macros are script which are to automate your Task, but Hackers and Intruders use this features to Inject VBA Payloads in Macros, This video will you to safeguard your computer and Home Netwok

Preview 02:00

This is last Video of the course , I discussed a Brief summary of the course , Hope you people Enjoyed Learning this Course.

Preview 00:55
About the Instructor
Ronit Yadav
3.8 Average rating
11 Reviews
121 Students
3 Courses
Penetration Tester & Instructor @Udemy

I am Ethical Hacker and Cyber Security Consultant. I also provide
Trainings for Ethical Hacking, Digital Forensics and Programming
Languages. Since One year, I have been successfully conducted various
seminars & workshops across numerous Schools, covered almost all the
Colleges in Mumbai, Mumbai University, various chartered accountants
study circle meeting, Hospitals & even Govt departments. I also assists
the Cyber Cell Departments of Mumbai Police with respect to their queries.