Malware Analysis Table of Contents

Table of Content


Malware Analysis Basics and Lab Setup

  • What Is Malware and the Need for Malware Analysis
  • Types of Malware
  • Malware Analysis Methodology
  • How to Set Up Your Lab?
  • Why a Snapshot Is Useful?
  • Some Warnings

Dynamic Malware Analysis

  • Why Dynamic Analysis?
  • Monitoring System Processes
  • Analyzing Network Traffic
  • Detecting Local Changes
  • What Is a Debugger?
  • Basic Features of OllyDbg
  • Malware Analysis Using OllyDbg

Static Malware Analysis

  • Why Static Analysis?
  • x86 Instruction Set
  • Introduction to File Formats
  • Extracting Useful Information from Malware Binary
  • Finding Imports and Linked Files
  • How a Disassembler Can Help Us?
  • Basic Features of IDA Pro
  • Malware Analysis Using IDA Pro

Malware Evasion Techniques

  • Anti-Debugging
  • Anti-Disassembly
  • Anti-Virtual Machines
  • Data Encoding
  • Polymorphism
  • More Evasion Techniques

Malware Functionalities

  • Backdoors
  • Keyloggers and Information Stealers
  • Downloaders
  • Ransomware
  • Rootkits

Malware Advanced Techniques

  • Privilege Escalation
  • Persistence Methods
  • Data Encoding
  • Covert Launching Techniques

Advanced Dynamic Malware Analysis

  • Using a Debugger
  • An Overview of the Windows Environment
  • User Mode Debugging
  • Malware Analysis Using OllyDbg
  • Features of OllyDbg
  • Kernel Mode Debugging
  • Malware Analysis Using WINDBG
  • Features of WINDBG

Advanced Static Malware Analysis

  • Advanced Notes on the x86 Architecture
  • How a Disassembler Can Help Us
  • Loading and Navigating Using IDA Pro
  • Functions in IDA
  • IDA Pro Graphic Features
  • Analysing Malware Using IDA Pro

Malware Detection and Defence

  • Malware Detection Techniques
  • Steps to Clean a Compromised Network
  • How Intrusion Detection Systems Work
  • An Introduction to Snort
  • How to Setup Snort?

Evasive Malware

  • How Do Packers Work?
  • How to Detect Packed Malware?
  • How to Unpack a Malware Program?
  • Examples of Unpacking a Malware Program

Apply for certification

 For Support