THE SCIENCE OF ENGINEERING MALWARE

WHO SHOULD TAKE THIS COURSE

KEY TAKEAWAYS

- Students will understand how malware is built from the ground up and will know malicious code from the inside out- Students will learn not only how to analyse malware but where and what to look for when analysing malware- This course aims to set students up for future success in malware analysis and Research by teaching them about the fundamentals of code that malware is based on, providing knowledge that can be used regardless of the future evolution of malware techniques

OVERVIEW

- Basic fundamentals of functions in programming languages
- How to write functions for specific purposes
- Assembly language: Memory, Logical Operations, Stack and String Instructions
- Writing code for specific actions in scripting languages
- Analysing script-based code
- Writing code for binaries that have specific goals (PEs and DLLs)
- Analysing binaries by targeting code and reverse engineering specific functions
- How to use malware analysis tools such as WinDbg, OllyDbg, Gdb, Ghidra and many more both on Windows and Linux

--

--

--

DFIR enthusiast. Founder of HCKSYD. Founder of Security BSides Sydney Australia. Malware Analyst.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Developing a Bluetooth agent in Qt/C++ with BlueZ and D-Bus — Part 1

What I Learned This Week In Cyber 6/16/22

HKS: You shall not LastPass!

Integrating Ledger Nano With the NNS Front-End Dapp: User Manual

Cryptography-applications in real world

Announcing: CyLon Scale

Meet the Founder: Sweepatic Security

2021 CTF — Reverse Engineering Malicious Code

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Vishal Thakur

Vishal Thakur

DFIR enthusiast. Founder of HCKSYD. Founder of Security BSides Sydney Australia. Malware Analyst.

More from Medium

Learning Packet Analysis — I

CEH Practical Review/Guide — How to prepare and ace your exam in the first attempt

My eCPPTv2 Experience

Cyber Research #29