Course Description
This course walk you through the most common techniques used by malware and how to use IDA Pro to reverse engineer malware samples and identify their capabilities.
Pricing Options
Kindly choose the enrollment pricing option that suits you best. If you're enrolling as a group or need a custom plan, please contact us. We're here to help!
Course Curriculum
-
-
Introduction to Malware Capabilities
-
Information Stealing
-
Data Encoding and Encryption
-
Process Injection
-
Code Obfuscation
-
Required Files
-
Exercise #1
-
Exercise #1-Solutions
-
-
-
Introduction to IDA Pro Part 1
-
Introduction to IDA Pro Part 2
-
Introduction to IDA Pro Part 3
-
-
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
-
Initial Sample Analysis
-
Required Files
-
Exercise #1
-
Exercise #1 Solutions
-
-
-
Resource(s)
-
About this course
- $50.00
- 24 lessons
- 0 hours of video content
Learning Outcomes
After completing this course, you will learn the following:
-
Learn common malware capabilities and techniques
-
Learn the basics of IDA Pro and how to customize it
-
Learn how to reverse engineer different malware types
Technical Requirements
For the hands-on labs in this course
-
Internet Connection
-
Workstation with at least 16GB RAM and 100GB Disk Space
-
Operating System (Windows or Linux)
-
VirtualBox or VMWare (hypervisor)
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates