Course Description
The program covers multiple modules designed to systematically build your expertise, focusing on PE analysis, assembly and reverse engineering, debugging, deobfuscation, and reporting. Each module enhances your ability to analyze, interpret, and respond to malware threats effectively, equipping you with the technical proficiency needed in real-world cybersecurity environments.
Training Delivery Details
Instructor Led Training
Live Training: 45 hours (3 hours / Day) | Includes 24 hours of virtual lab access | Certification of Attendance
The course material includes full access to our
Malware Analysis - On-Demand Course
Sessions starts from 9 AM to 2 PM (Eastern Time) or scheduled upon a mutual agreement
Training fees: $2250
Syllabus
After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.
2. Working with a Sandbox and Different Analysis Tools
3. PE File Analysis
4. Assembly x86/x64 Crash Course
5. Reverse Engineer and Debugging Malware
6. Analyzing Different Injection Techniques
7. Malware Persistence Mechanisms
8. Obfuscation and Anti-Analysis Techniques
9. Analyzing Malware Armed with Shellcode
10. Analyzing Managed Code (readable/uncompiled)
11. Extracting IOCs and writing YARA Rules
12. Writing Reports
Instructor
Cyber 5W Team
Learning Objectives
After completing this course, the student will be able to perform the following:
-
Ability to Analyze Malware using Different Tools and Sandboxes
-
Learn assembly x86/x64
-
Learn how to reverse engineer and debug malware
-
Ability to analyze malware with different injection techniques
-
Learn about malware persistence, obfuscation, and anti-analysis techniques
-
Learn how to locate and analyze malware using shellcode
-
Ability to analyze malware written using managed languages, such as: .NET, HTA, VBScript, Python, and JavaScript
-
Ability to extract IOCs from malware samples and turn them into YARA rules
-
Learn how to write malware analysis reports
Prerequisites
This course assumes no previous knowledge in malware analysis. However, basic knowledge in computer science, operating systems, programming, assembly, or any related field is highly desirable.
Important: Learners must have experience installing software and running virtual machines within a hypervisor. Please ensure you are comfortable setting up and managing virtual machines independently.
The Value of the Training
Who is this Training For?
System Requirements:
what you need to for the course
2. Capability of running virtualization software (VMWare or VirtualBox) and the attendee is comfortable of running malware on it.
3. More than 50 GB of disk space for the VMs used.