Course Curriculum

  • 01

    Malware Capabilities

    • Introduction to Malware Capabilities

    • Information Stealing

    • Data Encoding and Encryption

    • Process Injection

    • Code Obfuscation

    • Required Files

    • Exercise #1

    • Exercise #1-Solutions

  • 02

    IDA Pro Overview

    • Introduction to IDA Pro Part 1

    • Introduction to IDA Pro Part 2

    • Introduction to IDA Pro Part 3

  • 03

    Reversing Information Stealers

    • Initial Sample Analysis

    • Required Files

    • Exercise #1

    • Exercise #1 Solutions

  • 04

    Reversing Ransomwares

    • Initial Sample Analysis

    • Required Files

    • Exercise #1

    • Exercise #1 Solutions

  • 05

    Reversing Obfuscated Code

    • Initial Sample Analysis

    • Required Files

    • Exercise #1

    • Exercise #1 Solutions

  • 06

    Resource(s)

    • Resource(s)

Learning Outcomes

After completing this course, you will learn the following:

  • Learn common malware capabilities and techniques

  • Learn the basics of IDA Pro and how to customize it

  • Learn how to reverse engineer different malware types

Technical Requirements

For the hands-on labs in this course

  • Internet Connection

  • Workstation with at least 16GB RAM and 100GB Disk Space

  • Operating System (Windows or Linux)

  • VirtualBox or VMWare (hypervisor)

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates