Introduction to Malware Analysis Course Course
48 minutes
Course description
An introduction to reverse engineering, including the various types of malware and some examples of malware in use today. We will also identify various common malware behaviors and explore the malware analysis process. Also included are some common obfuscation techniques used by malware to avoid analysis and detection. This introduction will give you a great start on what malware analysis and reverse engineering are all about.
                            Syllabus
                                    Tools list
                                    File
                                
                            
                                    Note-taking template
                                    File
                                
                            
                                    Learning Resources
                                    File
                                
                            
                                    Malware analysis process
                                    Video - 00:07:00
                                        
                                            
                                        
                                
                                    
                                            
An overview of the process used to analyze malware.
                                        
                                    
                                    Anti-analysis techniques
                                    Video - 00:14:00
                                        
                                            
                                        
                                
                                    
                                            
Identifying the common obfuscation techniques that malware uses.
                                        
                                    
                                    Common malware behavior
                                    Video - 00:09:00
                                        
                                            
                                        
                                
                                    
                                            
Identifying common behaviors exhibited by malware.
                                        
                                    
                                    Malware types
                                    Video - 00:15:00
                                        
                                            
                                        
                                
                                    
                                            
An overview of the various types of malware.
                                        
                                    
                                    Malware analysis introduction
                                    Video - 00:03:00
                                        
                                            
                                        
                                
                                    
                                            
Welcome to the reverse engineering path.
                                        
                                    
Unlock 7 days of free training
                            - 1,400+ hands-on courses and labs
 - Certification practice exams
 - Skill assessments
 
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Custom certification practice exams (e.g., CISSP, Security+)
 - Skill assessments
 - Infosec peer community support
 
Infosec Skills Teams
Book a meeting to get a custom quote
- Team administration and reporting
 - Dedicated client success manager
 - 
                                
                                Single sign-on (SSO)
                                    
                                        Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
 - 
                                
                                Integrations via API
                                    
                                        Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
 - 190+ role-guided learning paths and assessments (e.g., Incident Response)
 - 100s of hands-on labs in cloud-hosted cyber ranges
 - Create and assign custom learning paths
 - Custom certification practice exams (e.g., CISSP, CISA)
 - Optional upgrade: Guarantee team certification with live boot camps
 
Award-winning training you can trust