We may earn an affiliate commission when you visit our partners.
Course image
Josh Stroschein
Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for...
Read more
Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the knowledge and skills to effectively tackle packing!
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills in unpacking real-world malicious code, which is essential for security professionals
Taught by Josh Stroschein, who is recognized for their work in this field
Employs tools such as IDA Pro and WinDbg, which are industry-standard tools for malware analysis
Requires familiarity with malware analysis and investigation techniques
May be useful for students, security professionals, and malware analysts

Save this course

Save Malware Analysis: Identifying and Defeating Packing to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Malware Analysis: Identifying and Defeating Packing. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Malware Analysis: Identifying and Defeating Packing will develop knowledge and skills that may be useful to these careers:
Malware Analyst
Malware analysts work on the front lines of cybersecurity. They examine malicious software, known as malware, to neutralize threats to computer systems and individual devices. A graduate of this course will gain the skills needed to identify different types of packers, how to defeat them, and how to reverse engineer malware. This course is the natural choice for a budding malware analyst.
Cybersecurity Analyst
Cybersecurity analysts work to protect organizations from breaches and attacks. Graduates of this course will learn how to analyze malicious software and ways to combat packing techniques, both of which can aid these analysts in protecting against attacks that breach organizational defenses.
Information Security Analyst
Information security analysts design, implement, and maintain information security programs to protect against vulnerabilities and cybercrime. This course will help graduates of the program identify ways to protect against malicious software through all facets of the security posture. How to analyze malware and defeat packing techniques, both of which are included in the course, are essential skills for professionals in this field.
Network Security Engineer
Network security engineers plan, implement, and monitor network security systems and strategies. This course will help graduates of the program identify vulnerabilities, analyze malicious software, and develop ways to protect networks from attacks. These tasks are all part of the day-to-day responsibilities of a network security engineer.
Security Engineer
Security engineers design, implement, and manage security solutions to protect networks, systems, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Mastery of the techniques taught in this course can help budding security engineers protect systems from malicious software and improve their response to attacks.
Security Architect
Security architects design and implement security solutions to protect organizations from cyber threats, including malware. They create security policies, procedures, and tools, and oversee the implementation and maintenance of security systems.
Security Consultant
Security consultants provide guidance to organizations on how to protect their systems from malware and other threats. This course will provide the necessary skills to analyze malware, identify packing techniques, and reverse engineer it.
Software Developer
Software developers write and maintain the code that makes software applications work. They use their knowledge of programming languages and software development tools to create software that meets the needs of users.
Software Engineer
Software engineers design, develop, and maintain software applications. They use their knowledge of programming languages and software development tools to create software that meets the needs of users.
Computer Programmer
Computer programmers write and maintain the code that makes software applications work. They use their knowledge of programming languages and software development tools to create software that meets the needs of users.
Computer Scientist
Computer scientists research and develop theories and techniques for solving computational problems.
Data Scientist
Data scientists use their knowledge of mathematics, statistics, and computer science to extract insights from data.
Database Administrator
Database administrators design, implement, and maintain databases.
Information Technology Specialist
Information technology specialists provide technical support to users of computer systems.
Network Administrator
Network administrators design, implement, and maintain computer networks.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Malware Analysis: Identifying and Defeating Packing.
Collection of recipes for performing malware analysis tasks. It valuable resource for anyone who wants to learn more about malware analysis, and it is particularly useful for those who are already familiar with the basics of malware analysis.
Practical guide to malware analysis, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about malware analysis.
Provides an in-depth look at reverse engineering, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about reverse engineering.
Provides an overview of software security assessment, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about software security.
Guide to malware detection for system administrators. It valuable resource for anyone who wants to learn more about malware detection and how to protect their systems from malware.
Provides a comprehensive overview of computer security, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about computer security.
Guide to memory forensics, which is the process of analyzing the memory of a computer to find evidence of malware. It valuable resource for anyone who wants to learn more about memory forensics and how to use it to detect and remove malware.
Provides a comprehensive overview of network security, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about network security.
Guide to malware analysis for Android devices. It valuable resource for anyone who wants to learn more about malware analysis and how to protect Android devices from malware.
Provides an overview of shellcoding, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about shellcoding.
Provides an overview of assembly language, and it covers a wide range of topics, including packing. It valuable resource for anyone who wants to learn more about assembly language.
Memoir by Clifford Stoll, a computer scientist who tracked down a hacker who was spying on the United States military. It fascinating read that provides insights into the world of malware and espionage.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser