Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malware Analysis

via YouTube

Overview

This course on Malware Analysis aims to teach students how to analyze and dissect various types of malware such as ransomware, web shells, and Java malware. By the end of the course, learners will be able to conduct behavioral and static analysis, identify indicators of compromise, reverse engineer malware, and attribute malware campaigns to nation-states. The course covers skills such as extracting indicators from malware, analyzing malicious documents, detecting Java malware, and identifying command and control mechanisms. The teaching method includes live streams, hands-on analysis of malware samples, and demonstrations using tools like CyberChef. This course is intended for cybersecurity professionals, malware analysts, incident responders, and anyone interested in understanding the inner workings of malware and cyber threats.

Syllabus

Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware.
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader.
Analysing an Emotet Downloader with CMD Watcher and CyberChef.
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques.
Live Stream - Part 2 - Emotet Downloader Analysis.
Live Stream - Finding Emotet's Config.
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection.
COVID19 Malware - Getting Closer to the Bad Guys.
Crack The BAT - Identifying Compression, Packers & Googling for IOCs.
Wrangle with Hangul - Analysis of a malicious hwp document.
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering.
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims.
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell.
JNLP Dangers - Java Malware Detection & Analysis.
Remcos Config - Using RC4 to Get Command & Control from CyberChef.
How to STEAL $1bn - A look at the Bangladesh Bank Heist.
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign.
JavaScript Malware - How bad can it be?.
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign.
NSO Pegasus Malware - How Governments spy on any phone.
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States.

Taught by

Colin Hardy

Reviews

Start your review of Malware Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.