Course Description
This course walk you through the most common techniques used by malware and how to use Ghidra to reverse engineer malware samples and identify their capabilities.
Pricing Options
Kindly choose the enrollment pricing option that suits you best. If you're enrolling as a group or need a custom plan, please contact us. We're here to help!
Course Curriculum
-
01
Malware Capabilities
-
Introduction to Malware Capabilities
-
Information Stealing
-
Data Encoding and Encryption
-
Process Injection
-
Code Obfuscation
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
02
Ghidra Overview
-
Introduction to Ghidra Part 1
-
Introduction to Ghidra Part 2
-
Introduction to Ghidra Part 3
-
-
03
Reversing Information Stealers
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
04
Reversing Ransomwares
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
05
Reversing Obfuscated Code
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
06
Resource(s)
-
Resource(s)
-
Learning Outcomes
After completing this course, you will learn the following:
-
Learn common malware capabilities and techniques
-
Learn the basics of Ghidra and how to customize it
-
Learn how to reverse engineer different malware types
Technical Requirements
For the hands-on labs in this course
-
Internet Connection
-
Workstation with at least 16GB RAM and 100GB Disk Space
-
Operating System (Windows or Linux)
-
VirtualBox or VMWare (hypervisor)
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates