Course Overview

The number of cyber-attacks is growing exponentially, and every cyber-attack utilizes some malicious code and some malware. Companies around the world are losing billions of dollars every year because of information security breaches caused by malware. The companies invest more in protecting and analyzing constant malware threats, being in constant need of incident responders. Malware analysis is the study or process of determining the functionality, origin, and potential impact of a given malware samples such as a virus, worm, trojan horse, rootkit, or backdoor.

This course will equip you with skills and tools that will allow you to be an incident responder and identify and analyze attacks and the malware used in them. You will start with examining what malware is, how it developed over history, what types of malware there are as well as what are the tools and how to perform static and dynamic malware analysis. You will also venture further into how model malware and intrusion detection tools work and how AI and machine learning can be utilized to augment malware analysis and detection. 

By the end of the course, you will be equipped to respond to incidents, analyze malware and develop algorithms that will help you with these tasks.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Malware-Analysis-Fundamentals

What You Will Learn

  • History of malware and malicious software on PC.
  • You will learn what is virus
  • worm
  • Trojan
  • rootkit
  • ransomware
  • mobile malicious code
  • etc.
  • Learn how malicious software work and propagate
  • how they use exploits.
  • Explore how to build your own malware analysis lab.
  • Discover how to perform static and dynamic malware analysis.
  • Learn how to apply your skills to reverse engineer non-malicious software and gain insight into how they operate.
  • Gain knowledge about how AI and machine learning can help to detect malware.
  • Explore fingerprinting malware and reverse engineer it using several tools.

Program Curriculum

  • What is Malware?
  • Topology of Malware: Viruses
  • Topology of Malware: Worms
  • Topology of Malware: Other Malware Types
  • History of Malware: Early Development
  • History of Malware: The Age of Cybercrime
  • History of Malware: Government Enters the Stage
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Why Malware Analysis Lab Is Needed?
  • Sandboxing and Virtualization
  • Malware Analysis Lab Toolbox
  • VirtualBox Demo
  • Chapter 2 Quiz

  • Static Analysis and Malware Fingerprinting
  • Strings, Packers and Libraries
  • PE File Structure and Resources
  • Going Deeper: Decompiling
  • Hands on Demonstration of Tools
  • Chapter 3 Lab
  • Chapter 3 Quiz

  • Introduction to Dynamic Malware Analysis
  • Monitoring Processes
  • Monitoring Network
  • Introduction to Debugging Malware
  • Introduction to Debugging Malware - Part 2
  • Hands on Demonstration of Tools
  • Chapter 4 Lab
  • Chatper 4 Quiz

  • Malware Detection Traditionally
  • AI in Cyber Security and Malware Analysis
  • Case study: Android Malware Detection
  • Chatper 5 Quiz

Wrap up

Load more modules

Instructor

Dr. Nikola Milosevic Milosevic

Dr Nikola Milosevic has extensive experience as a researcher in cybersecurity, as well as in artificial intelligence and has written a number of papers on these topics that are published in relevant journals. Nikola gained his PhD in computer science from the University of Manchester, where he also worked as a research fellow and teaching assistant. He also has experience as a university lecturer teaching master courses in information security, malware analysis and reverse engineering at the University of Salford. In addition to his academic career, Nikola has experience in the industry and at relevant cyber security open source organizations. He was OWASP (Open Web Application Security Project) local chapter leader in Belgrade and Manchester. Also, he was OWASP project leader in the OWASP Seraphimdroid project, a mobile security and privacy protection app.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8