C5W-500 MALWARE ANALYSIS
On-Demand Course Includes:
Course Material | Labs | Certification Exam
On-Demand Course Includes:
Course Material | Labs | Certification Exam
Dive into our comprehensive Malware Analysis course, designed to elevate enthusiasts from beginners to experts in tackling digital threats. This journey unravels the essential techniques and tools for identifying, analyzing, and neutralizing malware. With a combination of theoretical insights and practical exercises, including more than 45 hands-on labs, learners will master static and dynamic analysis, dissect complex malware with leading tools like IDA Pro and Ghidra, and delve into the specifics of handling readable/uncompiled code. Additionally, students will become proficient in extracting Indicators of Compromise (IOCs) and crafting precise YARA rules to detect and mitigate threats effectively. Culminating in a certification exam, this course offers a pathway to not only gain a thorough understanding of malware's inner workings but also to achieve recognition for your expertise in the field. Whether you're looking to start a career in cybersecurity, enhance your current skills, or secure your digital environment, this course provides the knowledge and hands-on experience needed to face malware threats head-on. Learners who complete the course and pass the exam will earn the C5W Certified Malware Analyst (CCMA).
Welcome & Lab Access
Required Files
Introduction
Installing VirtualBox
Installing Remnux VM
Common Terminology
Malware Analysis Stages
Initial File Triage
Lab #1 - Initial Triage 1
Lab #1 - Initial Triage (Solution)
Lab #2 - Initial Triage 2
Lab #2 - Initial Triage 2 (Solution)
Introduction to Sandboxes
Virustotal Sandbox
Triage Sandbox
ANY.RUN Sandbox
Disadvantages of Sandboxes
Public Intelligence
Lab #3 - Public Intelligence
Lab #3 - Public Intelligence (Solution)
Public Detections
Required Files
Introduction to PE Files
DOS Header
NT Headers
Section Headers
Data Directories
Lab #1 - Sample 1 Static Analysis
Lab #1 - Sample 1 Static Analysis (Solution)
Lab #2 - Sample 2 Static Analysis
Lab #2 - Sample 2 Static Analysis (Solution)
Lab #3 - Sample 3 Static Analysis
Lab #3 - Sample 3 Static Analysis (Solution)
Introduction to Win32 API
Windows Coding Conventions
Common Win32 API Functions
Lab #4 - Sample 4 Static Analysis
Lab #4 - Sample 4 Static Analysis (Solution)
Code Compilation Process
Introduction to x86 Assembly
Data Movement Instructions
Arithmetic Instructions
Bitwise Instructions
Conditional and Branching Instructions
Stack Instructions
Lab #5 - Sample 5 Static Analysis
Lab #5 - Sample 5 Static Analysis (Solution)
Lab #6 - Sample 6 Static Analysis
Lab #6 - Sample 6 Static Analysis (Solution)
Required Files
Windows Architecture Part 1
Windows Architecture Part 2
Windows Architecture Part 3
Introduction to Dynamic Analysis
Monitoring System Processes
Monitoring System Events
Monitoring Autoruns
Monitoring API Calls
Lab #1: Sample 1 Dynamic Analysis
Lab #1: Sample 1 Dynamic Analysis - (Solution)
Lab #2: Sample 2 Dynamic Analysis
Lab #2: Sample 2 Dynamic Analysis - (Solution)
Lab #3: Sample 3 Dynamic Analysis
Lab #3: Sample 3 Dynamic Analysis - (Solution)
Introduction to Network Analysis Tools
Analyzing Malware Traffic
Lab #4: Sample 4 Dynamic Analysis
Lab #4: Sample 4 Dynamic Analysis - (Solution)
Lab #5: Sample 5 Dynamic Analysis
Lab #5: Sample 5 Dynamic Analysis - (Solution)
Using ProcessHacker to Detect Installed Windows Services
Resource(s)
Required Files
Introduction to Malware Capabilities
Information Stealing
Data Encoding and Encryption
Process Injection
Code Obfuscation
Lab #1: Static Malware Analysis 102 -IDA PRO
Lab #1: Static Malware Analysis 102 -IDA PRO - Solution
Introduction to IDA Pro Part 1
Introduction to IDA Pro Part 2
Introduction to IDA Pro Part 3
Initial Sample Analysis I
Lab #2 - Information Stealer - IDA
Lab #2 - Information Stealer - IDA (Solution)
Initial Sample Analysis II
Lab #3 - Ransomware - IDA
Lab #3 - Ransomware - IDA (Solution)
Initial Sample Analysis III
Lab #4 - Obfuscation Techniques - IDA
Lab #4 - Obfuscation Techniques - IDA (Solution)
x86 Assembly Crash Course (Extra Reading)
Required Files
Introduction to Malware Capabilities
Information Stealing
Data Encoding and Encryption
Process Injection
Code Obfuscation
Lab #1: Static Malware Analysis 102 - Ghidra
Lab #1: Static Malware Analysis 102 - Ghidra - (Solution)
Introduction to Ghidra Part 1
Introduction to Ghidra Part 2
Introduction to Ghidra Part 3
Initial Sample Analysis I
Lab #2 - Information Stealer - Ghidra
Lab #2 - Information Stealer - Ghidra (Solution)
Initial Sample Analysis II
Lab #3 - Ransomware - Ghidra
Lab #3 - Ransomware - Ghidra (Solution)
Initial Sample Analysis III
Lab #4 - Obfuscation Techniques - Ghidra
Lab #4 - Obfuscation Techniques - Ghidra (Solution)
Required Files
Intro to Debugging and x64dbg - Part 1
Intro to x64dbg - Part 2
Using x64dbg Debugger
Static Malware Analysis using x64dbg Debugger
Bypassing Anti-Debugging with x64dbg
Unpacking UPX Packed Malware
Dumping Malware Payload using x64dbg
Lab #1: Debugging 101
Lab #1: Debugging 101 - Solutions
Lab #2: Debugging
Lab #2: Debugging - Solutions
Lab #3: Debugging
Lab #3: Debugging - Solutions
Lab #4: Debugging
Lab #4: Debugging - Solutions
Lab #5: Debugging
Lab #5: Debugging - Solutions
Lab #6: Debugging
Lab #6: Debugging - Solutions
Required Files
Overview of Managed Code
Managed Code Vs Unmanaged Code
Significance of Managed Code in Malware Analysis
Analysis of .net Malware - Static Analysis
Analysis of .net Malware - Code Analysis
Advanced dnSpy Features - Execution Tracing
Advanced dnSpy Features - Conditional Breakpoint
6. Advanced dnSpy Features - Locals \ Watches
Lab #1
Lab #1 - Solutions
Scripts Analysis
Lab #2
Lab #2 - Solutions
Documents Analysis
Lab #3
Lab #3 - Solutions
Required Files
Introduction
Yara Language Fundamentals
Avoiding False Positives
Crafting Effective Yara Rule
Testing Yara Rules
Lab #1 - Extracting IOCs
Lab #1 - Extracting IOCs (Solutions)
Lab #2 - Writing Yara Rules
Lab #2 - Writing Yara Rules (Solutions)
Writing YARA Rules 101
Writing More YARA Rules
Further Readings
Tools - Updated
How do I purchase a course?
You can enroll in any course directly through our platform using secure online payment.
How do I access my course after enrollment?
Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.
How long will I have access to the course material?
Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.
What are the general technical requirements?
Our platform is accessible from any device with internet access. For hands-on labs, we recommend:
Can I ask for help if I don't understand something?
Of course! Reach out by email anytime.
What is the expected time commitment for each course?
Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.
Do you offer student discounts?
Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.
Do you offer law enforcement and military professionals discounts?
Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.
Do you offer corporate training or customized training solutions?
Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.
Do your courses include Certificate of Completion?
All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.
Do you deliver on-site training for employees?
Yes, we tailor on-site training programs to your team's specific needs. Please contact us to discuss options, dates, and pricing.
Do you travel internationally?
Yes. Our instructors can deliver on-site training globally. Travel expenses will apply.
How long are your on-site training sessions?
Courses can range from one-day workshops to multi-week immersive programs, depending on your goals.
Can we customize the syllabus?
Absolutely! We work with you to design a tailored syllabus that matches your team's skill level and focus areas.
Do you provide virtual lab access?
Yes, all labs are accessible at labs.cyber5w.com.
What if my computer isn't good enough for the labs?
No worries, you can complete all exercises in our prebuilt virtual lab environment. No special hardware is needed, only a modern web browser to access the online labs.
What software or tools are installed in the virtual labs?
Each lab comes preloaded with the tools you'll need to successfully complete the exercises in the course you are learning.
How long do I have access to the labs?
Your virtual lab access comes with a predefined set of hours, but you can extend the lab access time as preferred (optional).
What professional certifications can I earn?
Cyber5W offers a series of hands-on, industry-recognized certifications to validate your expertise in digital forensics and threat analysis. These certifications are available as optional exams after completing the relevant training.
I'm new to DFIR, which professional certifications are available for beginners?
Can I retake a test if I do not pass the exam?
Yes, we allow multiple retake attempts. Check your exam specifics or contact support if you need further help.
What support is available during an exam?
You may email [email protected] for logistics and technical issues, but no exam-specific assistance will be provided.
How are CYBER 5W certification exams different from traditional tests?
At CYBER 5W, our certification exams are skill-based, not just multiple-choice. We assess your practical knowledge through real-world tasks to ensure you can apply what you've learned.
Can't find the answer you're looking for? Please chat to our friendly team.
Get in touchSign up for the latest findings, field advancements, and updates on upcoming webinars, conferences, seminars, and free courses.