Course

Malware Analysis and Introduction to Assembly Language

IBM

Discover the intricate world of malware analysis and Assembly language with this comprehensive course from IBM. Through video demonstrations, hands-on reverse engineering, and capture-the-flag activities, you will explore the processes and methods for dissecting various file types, including native executables, PowerShell, JavaScripts, Microsoft Office documents, ELF file formats, ASPX webshells, and JAR files. The course also introduces you to the fundamentals of Assembly language and Win32 Assembly programming, enabling you to comprehend and analyze malware.

As you progress through the modules, you will learn how to set up virtual machines, perform static and dynamic analysis, engage in manual code reversing, and analyze diverse file formats. Each module is designed to build your skills and knowledge, culminating in a detailed understanding of malware analysis and Assembly language. Whether you are seeking to enhance your cybersecurity expertise or delve into the world of reverse engineering, this course provides a comprehensive foundation for understanding and combating malicious software.

Certificate Available ✔

Get Started / More Info
Malware Analysis and Introduction to Assembly Language
Course Modules

This course offers a comprehensive exploration of malware analysis and Assembly language. From setting up virtual machines to analyzing diverse file formats and delving into the fundamentals of Assembly language, each module provides hands-on learning opportunities to enhance your cybersecurity skills.

Malware analysis overview and process

Malware analysis overview and process

  • Gain an introduction to the malware analysis process and course overview.
  • Understand the knowledge check and assessment aspects related to malware analysis.

Virtual Machine Setup

Virtual Machine Setup

  • Learn how to set up a virtual machine using Flare-VM and engage in capture-the-flag exercises.
  • Explore the steps to install various essential tools and software within the virtual machine environment.

Static and Dynamic analysis

Static and Dynamic analysis

  • Master the techniques for static and dynamic analysis, including capture-the-flag exercises and knowledge checks.
  • Dive into the assessment of static and dynamic analysis modules to solidify your understanding.

Manual code reversing

Manual code reversing

  • Engage in hands-on activities to understand the process of manual code reversing and participate in capture-the-flag exercises.
  • Test your knowledge through knowledge checks and assessments related to manual code reversing.

Analyze PowerShell, JavaScript, and macro-enabled documents

Analyze PowerShell, JavaScript, and macro-enabled documents

  • Explore the analysis of PowerShell scripts, JavaScripts, and macro-enabled documents through video demonstrations and capture-the-flag exercises.
  • Participate in knowledge checks and assessments to reinforce your understanding of this module.

Analyze ELF file format

Analyze ELF file format

  • Set up REMnux and Fakenet-NG to analyze the ELF file format and engage in capture-the-flag exercises.
  • Participate in knowledge checks and assessments to solidify your understanding of analyzing the ELF file format.

Analyze ASPX Webshell and JAR files

Analyze ASPX Webshell and JAR files

  • Gain insights into the analysis of ASPX webshells and JAR files, and participate in capture-the-flag exercises.
  • Test your knowledge through knowledge checks and assessments related to analyzing ASPX webshells and JAR files.

Introduction to Assembly Language

Introduction to Assembly Language

  • Understand the basics of Assembly language, commonly used instructions, and Win32 Assembly programming through video demonstrations and assessment activities.
  • Participate in knowledge checks and assessments to reinforce your understanding of Assembly language.

Digital Badge

Digital Badge

Upon completing the course, you will earn a digital badge to showcase your expertise in malware analysis and Assembly language.

More Security Courses

Cybersecurity for Business

University of Colorado System

This course provides a practical perspective on cybersecurity for business. Learn to defend computer systems and assets from attackers and threats, and gain insights...

Check Point Jump Start: Maestro Hyperscale Network Security

Check Point Software Technologies Ltd.

Check Point Jump Start: Maestro Hyperscale Network Security provides comprehensive training on the installation, configuration, and management of the Maestro Orchestrator...

Sécurité des TI : Défense contre les pratiques sombres du numérique

Google

This course offers comprehensive coverage of IT security, including encryption, network security, and creating a secure organizational culture.

Metasploit for Beginners: Ethical Penetration Testing

Coursera Project Network

Metasploit for Beginners: Ethical Penetration Testing is a comprehensive training program that teaches how to identify and leverage weaknesses in system security,...