We may earn an affiliate commission when you visit our partners.
Jared DeMott, Christopher Rees, Cristian Pascariu, Tyler Hudak, Josh Stroschein, and Dr. Jared DeMott

In today’s threat landscape, sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. To achieve this, malware authors employ a wide variety of obfuscation and anti-analysis techniques at each phase of an attack. Developing the skills necessary as a malware analyst to properly detect, triage and reverse engineer advanced attacker intrusion tactics and techniques requires experience and a diverse set of tools and skills. In this path you will develop the skills and knowledge necessary to analyze malicious office documents, dig deep into native and interpreted code through disassembly and decompilation, identify and defeat prevalent obfuscation techniques. The courses in this path with take you from malware analysis basics to advanced topics so that you can generate valuable threat intelligence to aid in your efforts to defend your organization, respond more effectively to an incident or gain deeper understanding of the latest malware threats.This skills path may assist in attaining the knowledge and skills outlined in the NICE Cybersecurity Workforce Framework in the following areas:K0259 & K0479 Knowledge of malware analysis concepts and methodologies.S0131 Skill in analyzing malware.

Enroll now

Share

Help others find this collection page by sharing it with your friends and followers:

What's inside

Six courses

Getting Started Analyzing Malware Infections

(2 hours)
Malware infections are growing rapidly. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives to gather indicators of compromise.

Analyzing Malware for .NET and Java Binaries

(1 hours)
This course will teach the basics of Java and .NET runtimes, introduce tools and techniques for effectively reverse engineering these binary types, and show you how to identify indicators of compromise.

Getting Started with Reverse Engineering

(3 hours)
Reverse engineering binary code is a core skill for software security engineers, malware analysts, and penetration testers. This course will teach you techniques for reversing binary code to identify program characteristics and behavior.

Malware Analysis: Identifying and Defeating Code Obfuscation

(2 hours)
Malware authors often use obfuscation techniques to make their code harder to analyze. This course teaches you how to spot and beat these techniques, so you can find key signs of a problem and figure out what the malware does.

Defeating Anti-reverse Engineering and Anti-debugging Techniques

(1 hours)
Anti-reverse engineering and anti-debugging techniques are often used by malware authors to disrupt or prevent analysis, helping them to avoid detection. This course will teach you effective strategies for detecting and defeating these techniques.

Advanced Malware Analysis: Ransomware

(1 hours)
Ransomware attacks continue to grow, threatening individuals and companies. This course teaches how to detect, analyze, and protect against Ransomware attacks.

Save this collection

Save Malware Analysis to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser