Study any time, from any device.

Obfuscation, Encoding and Encryption

Reintroduce yourself to three ways malware disguises itself: obfuscation, encoding and encryption.

8 videos  //  41 minutes of training

Course overview

There are many ways that malware tries to duck detection or make itself difficult to analyze. In this course, eight videos reintroduce you to malware and its various disguises: obfuscation, encoding and encryption. Beginning with simple obfuscation techniques such as assigning junk values and running comparisons then ignoring set flags, you’ll get a closer look at advanced obfuscation, simple and complex ciphers, common crypto-algorithms, ransomware and the decoding process needed to combat these tricks. Everything from Caesar ciphers to crypto-libraries.

Course syllabus

Obfuscation DefinitionDuration: 6:12

Simple Obfuscation TechniquesDuration: 2:37

Advanced Obfuscation TechniquesDuration: 10:34

Simple Ciphers and Encoding SchemesDuration: 7:47

Base64Duration: 2:24

Common Crypto AlgorithmsDuration: 2:19

DecodingDuration: 2:41

RansomwareDuration: 6:06

Meet the author

Infosec

LinkedIn

At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.

You're in good company.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."

Val Vask

Commercial Technical Lead

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer