Aperçu du cours
Training objectives : Learn how to analyse a malware throughout several real-life cases
Prérequis
- Experience in programming (any language)
- Good understanding of Windows and Linux (registry, command line, configuration …)
- Understanding of compiled programs libraries (dynamic and static linking, DLL files)
- Basic knowledge in networking (HTTP protocol, TCP/IP sockets)
- Recommended : C/C++ programming (pointer manipulation, object-oriented programming)
- Recommended : Basic understanding of x86 assembly (stack, heap, sections …)
- Recommended : Basic knowledge of Win32 API (File operations, Registry operations, HTTP requests …)
Fonctionnalités
- Learn the methods and technics to analyse malwares
- Understand the functionalities of the analyzed malware
- Learn the steps taken by the malware
Public ciblé
- Cybersecurity expert
Détails
- 34 Sections
- 78 Lessons
- 28 heures
Expand all sectionsCollapse all sections
- MALWARE ANALYSIS PRIMER4
- MALWARE ANALYSIS PRIMER4
- BASIC STATIC TECHNIQUES8
- BASIC STATIC TECHNIQUES8
- Practical exercises2
- Practical exercises2
- BASIC DYNAMIC ANALYSIS1
- BASIC DYNAMIC ANALYSIS1
- Practical exercises2
- Practical exercises2
- BOOT COURSE IN X86 DISASSEMBLY1
- BOOT COURSE IN X86 DISASSEMBLY1
- IDA INTRO1
- IDA INTRO1
- DEBUGGING1
- DEBUGGING1
- RECOGNIZING C CODE CONSTRUCTS IN ASSEMBLY4
- RECOGNIZING C CODE CONSTRUCTS IN ASSEMBLY4
- Practical exercises2
- Practical exercises2
- PACKING AND CLASSIC PATTERNS3
- PACKING AND CLASSIC PATTERNS3
- Practical exercises2
- Practical exercises2
- .NET REVERSE1
- .NET REVERSE1
- Practical exercises1
- Practical exercises1
- Understanding of malware behavior2
- Understanding of malware behavior2
- ANTI REVERSE2
- ANTI REVERSE2
- Practical exercises:2
- Practical exercises:2