The Dynamic Malware Analysis 101 course introduces learners to the fundamentals of analyzing malicious software by observing its behavior in a controlled environment. This course focuses on runtime analysis techniques, teaching students how to safely execute, monitor, and evaluate malware samples to understand their functionality, persistence mechanisms, and system impact.
Through guided demonstrations and practical exercises, learners will explore how to use sandbox environments, process monitors, network analyzers, and registry tools to identify indicators of compromise and trace malware activity.
By the end of the course, participants will have a strong understanding of how to safely conduct dynamic analysis and extract actionable intelligence from live malware samples.
-
Self-Paced Learning: Access course materials at your convenience, allowing you to learn at your own pace.
-
Interactive Labs: Engage in practical exercises and labs to apply theoretical knowledge in real-world scenarios.
-
Virtual Lab Access: Enroll in the course with an option that includes 10 hours of virtual lab access for hands-on practice. Visi our
Virtual Lab Environment
-
Technical Requirements: Ensure you have a workstation with at least 16GB RAM and 100GB disk space, along with an internet connection, to participate in the hands-on labs.
-
-
-
Windows Architecture Part 1
-
Windows Architecture Part 2
-
Windows Architecture Part 3
-
-
Introduction to Dynamic Analysis
-
Monitoring System Processes
-
-
-
-
-
-
-
-
-
-
-
-
Introduction to Network Analysis Tools
-
Capturing Malware Traffic
-
Analyzing Malware Traffic
-
-
-
-
-
-
- Understand the principles and workflow of dynamic malware analysis.
- Set up and configure isolated lab environments for safe malware execution.
- Use tools such as ProcMon, Wireshark, and RegShot to monitor system and network behavior.
- Identify file, process, and registry modifications made by malware during execution.
- Analyze network communication patterns to detect data exfiltration and command-and-control (C2) behavior.