Fundamentals of Malware Analysis
- IT & Software
- Dec 06, 2024

Fundamentals of Malware Analysis, available at $59.99, has an average rating of 4.75, with 28 lectures, 4 quizzes, based on 6 reviews, and has 55 subscribers.
You will learn about Fundamentals of malware concepts and malware analysis. Create an environment to study the malware. Learn how to conduct static analysis of malware Learn how to conduct dynamic analysis of malware Understand different techniques that the malware uses to evade detection. Gain experience in working with OllyDbg, WINDBG, and IDA Pro Know how to detect and defend against malware This course is ideal for individuals who are Incident responders seeking to learn about malware or System administrators seeking to be proactive in their environment or Network engineers needing to understand malware or Penetration testers to understand the building of malice and become more advisory or beginner malware analysts and reverse engineering students It is particularly useful for Incident responders seeking to learn about malware or System administrators seeking to be proactive in their environment or Network engineers needing to understand malware or Penetration testers to understand the building of malice and become more advisory or beginner malware analysts and reverse engineering students.
Enroll now: Fundamentals of Malware Analysis
Summary
Title: Fundamentals of Malware Analysis
Price: $59.99
Average Rating: 4.75
Number of Lectures: 28
Number of Quizzes: 4
Number of Published Lectures: 28
Number of Published Quizzes: 4
Number of Curriculum Items: 32
Number of Published Curriculum Objects: 32
Original Price: $64.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
In this video course, we start with the basic concepts of malware and you’ll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, you’ll see how to set up your own lab to make a secure environment for malware analysis.
Moving on, you’ll get familiar with the basic techniques of static and dynamic malware analysis and gets your hands dirty with debuggers and disassemblers such as OllyDbg and IDA PRO. you’ll learn how to analyze malware and understand its anatomy using these tools and techniques. Finally, you’ll be exposed to the techniques that malware may use to evade detection and remain undetected.
By the end of the course, you’ll have a solid knowledge that will enable you to analyze the majority of malware programs.
The course has some hands-on sections to create basic familiarity with malware analysis environments; ensure machine being used has support for virtualization preferably using VirtualBox or VMWare. There are sections with testing elements that allow for knowledge gap analysis to ensure you can revisit any unclear sections. Looking forward to walking this journey with you and ensuring you gain interest in becoming a formidable incident responder or malware analyst/enthusiast going forth.
Course Curriculum
Chapter 1: Introduction to Malware and Setting Up Your Own Lab
Lecture 1: The Course Overview
Lecture 2: Malware Introduction & Need for Malware Analysis
Lecture 3: Types of Malware
Lecture 4: Malware Analysis Methodology
Lecture 5: Why a Snapshot Is Useful?
Lecture 6: How to Set Up Your Lab?
Lecture 7: Some Warnings
Chapter 2: Dynamic Malware Analysis
Lecture 1: Why Dynamic Analysis?
Lecture 2: Monitoring System Processes
Lecture 3: Analyzing Network Traffic
Lecture 4: What Is a Debugger?
Lecture 5: Detecting Local Changes
Lecture 6: Basic Features of OllyDbg
Lecture 7: Malware Analysis Using OllyDbg
Chapter 3: Static Malware Analysis
Lecture 1: Why Static Analysis?
Lecture 2: x86 Instruction Set
Lecture 3: Introduction to File Formats
Lecture 4: Extracting Useful Information from Malware Binary
Lecture 5: Finding Imports and Linked Files
Lecture 6: How a Disassembler Can Help Us?
Lecture 7: Basic Features of IDA Pro
Lecture 8: Malware Analysis Using IDA Pro
Chapter 4: Malware Evasion Techniques
Lecture 1: Anti-Debugging
Lecture 2: Anti-Disassembly
Lecture 3: Anti-Virtual Machines
Lecture 4: Data Encoding
Lecture 5: Polymorphism
Lecture 6: More Evasion Techniques
Instructors

Munir Njenga
Penetration Testing Consultant
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Investing in Canada - Free preview
- The Content Creation with ChatGPT, Gemini, Canva, RankMath
- Project Management in Marketing
- Basic Principles of Social Media Marketing
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Company Valuation Financial Modeling
- The Beginner Forex Trading Playbook
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4The Architecture of Oscar Niemeyer
- 5Advanced Photoshop Manipulations Tutorials Bundle
- 6SolidWorks Essential Training ( 2023 2024 )
- 7Python for Absolute Beginners
- 8Marketing Mix Modeling in one day for your Brand Analytics_1
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling