Reverse Engineering Malware Training
|Commitment||5 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Reverse Engineering Malware Training Course – Hands-on
Learn how to perform static malware analysis with this Reverse Engineering Malware Training
This Reverse Engineering Malware Training course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT’s) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Assembly language, PE Header, disassembling v/s debugging with advanced debugging features. We also perform RE to analyze an application dissecting it to the level where malware code is present.
We provide practice malware lab setup consisting of virtual machines and sandbox environment. We use debuggers such as IDA and Ollydbg, disassemblers and various monitoring tools to perform analysis to track the movement of the malware across the virtual network. We will also delve deep into advanced techniques such as analyzing shellcodes, powershell malwares, malicious documents and anti-virus evasion and so on. Further we take a peek at different anti-reversing, anti emulation and anti debugging techniques used by advanced malwares
Reverse Engineering Malware Training Course – Customize it
- We can adapt this Reverse Engineering Malware Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Reverse Engineering Malware Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Reverse Engineering Malware Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the training course in manner understandable to lay audiences.
Reverse Engineering Malware Training Course – Audience/Target Group
- Any individual looking forward to understand Reverse Engineering and Malware Analysis
Reverse Engineering Malware Training Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
- Be familiar with using Windows and Linux operating environments.
Reverse Engineering Malware Training – Course Content
Session 1: Introduction
- Case Studies
- Taxonomy of malwares
- Types and Infection Concepts
- Advance Persistent Threats v/s Malwares
Session 2: Assembly Language
- Introduction to Assembly Language x86?
- Computer Architecture
- Data Types
- What are Registers?
- Calling Conventions
- Understanding different Registers and Instructions
- Arithmetic Instructions
- Logical Instructions
- Control Instructions
- Flags in Assembly
Session 3: Reverse Engineering Executable
- Concept of PE
- Understanding PE Header
- Disassembling v/s Debugging
- Introduction to Debuggers and Disassembler
- Setting Breakpoints
- Debugging an Application
- Reversing Malware (Disassembling/Debugging)
Session 4: Malware Analysis
- Static Analysis
- Dynamic Analysis
Session 5: Advanced Analysis
- Capturing and Analyzing Infected Memory
- Analyzing malicious Documents
- Shellcode Detection & Analysis
- Extraction & Analyzing Methodologies