Course Description
This course walk you through the most common techniques used by malware and how to use IDA Pro to reverse engineer malware samples and identify their capabilities.
Pricing Options
Kindly choose the enrollment pricing option that suits you best. If you're enrolling as a group or need a custom plan, please contact us. We're here to help!
Course Curriculum
-
01
Malware Capabilities
-
Introduction to Malware Capabilities
-
Information Stealing
-
Data Encoding and Encryption
-
Process Injection
-
Code Obfuscation
-
Required Files
-
Exercise #1
-
Exercise #1-Solutions
-
-
02
IDA Pro Overview
-
Introduction to IDA Pro Part 1
-
Introduction to IDA Pro Part 2
-
Introduction to IDA Pro Part 3
-
-
03
Reversing Information Stealers
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
04
Reversing Ransomwares
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
05
Reversing Obfuscated Code
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
06
Resource(s)
-
Resource(s)
-
Learning Outcomes
After completing this course, you will learn the following:
-
Learn common malware capabilities and techniques
-
Learn the basics of IDA Pro and how to customize it
-
Learn how to reverse engineer different malware types
Technical Requirements
For the hands-on labs in this course
-
Internet Connection
-
Workstation with at least 16GB RAM and 100GB Disk Space
-
Operating System (Windows or Linux)
-
VirtualBox or VMWare (hypervisor)
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates