Discover the intricate world of malware analysis and Assembly language with this comprehensive course from IBM. Through video demonstrations, hands-on reverse engineering, and capture-the-flag activities, you will explore the processes and methods for dissecting various file types, including native executables, PowerShell, JavaScripts, Microsoft Office documents, ELF file formats, ASPX webshells, and JAR files. The course also introduces you to the fundamentals of Assembly language and Win32 Assembly programming, enabling you to comprehend and analyze malware.
As you progress through the modules, you will learn how to set up virtual machines, perform static and dynamic analysis, engage in manual code reversing, and analyze diverse file formats. Each module is designed to build your skills and knowledge, culminating in a detailed understanding of malware analysis and Assembly language. Whether you are seeking to enhance your cybersecurity expertise or delve into the world of reverse engineering, this course provides a comprehensive foundation for understanding and combating malicious software.
Certificate Available ✔
Get Started / More InfoThis course offers a comprehensive exploration of malware analysis and Assembly language. From setting up virtual machines to analyzing diverse file formats and delving into the fundamentals of Assembly language, each module provides hands-on learning opportunities to enhance your cybersecurity skills.
Malware analysis overview and process
Virtual Machine Setup
Static and Dynamic analysis
Manual code reversing
Analyze PowerShell, JavaScript, and macro-enabled documents
Analyze ELF file format
Analyze ASPX Webshell and JAR files
Introduction to Assembly Language
Digital Badge
Upon completing the course, you will earn a digital badge to showcase your expertise in malware analysis and Assembly language.
This course provides a practical perspective on cybersecurity for business. Learn to defend computer systems and assets from attackers and threats, and gain insights...
Check Point Jump Start: Maestro Hyperscale Network Security provides comprehensive training on the installation, configuration, and management of the Maestro Orchestrator...
This course offers comprehensive coverage of IT security, including encryption, network security, and creating a secure organizational culture.
Metasploit for Beginners: Ethical Penetration Testing is a comprehensive training program that teaches how to identify and leverage weaknesses in system security,...