COURSE

Intro to Malware Analysis and Reverse Engineering

Course

Are you on the path to becoming a SOC Analyst or preparing for your CEH exam? This malware analysis course will help you advance your career and protect your organization from critical threats. Learn how to perform analysis on all major files types, carve malicious executables from documents, and recognize common malware tactics.
Full access included with 
Insider Pro
 and 
Teams

9

H

10

M
Time

advanced

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

9

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

778

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Malware Analysis Basics is an intermediate-level course designed to introduce you to the fundamental concepts of malware analysis. Through hands-on labs, you’ll learn how to examine malicious software, understand how it operates, and determine its impact on systems and networks. By the end of the course, you’ll have a solid foundation to build upon for further cybersecurity training and career growth.

Read More

Skills you'll gain

  • Defining malware analysis
  • Identifying different malware analysis techniques
  • Performing static malware analysis
  • Performing dynamic malware analysis

Course Outline

1
Module 1 - Introduction
0
H
41
Min
1
Module 2 - Lab Setup
0
H
42
Min
1
Module 3 - Dynamic Analysis Part 1
0
H
45
Min
1
Module 4 - Dynamic Analysis Part 2
0
H
41
Min
1
Module 5 - Basic Static Analysis
3
H
36
Min
1
Module 6 - Packers
1
H
22
Min
1
Module 7 - Malware Defenses
1
H
23
Min

Packers Part 1

Free

20m

Basic Static Analysis Part 1

Free

38m

Lab Setup Part 1

Free

2m

Intro Part 1

Free

23m

Dynamic Analysis Part 2.1

Free

11m

Dynamic Analysis Part 1.1

Free

5m

Basic Static Analysis Part 2

Free

34m

Packers Part 2

Free

6m

Dynamic Analysis Part 2.2

Free

30m

Intro Part 2

Free

10m

Dynamic Analysis Part 1.2

Free

26m

Lab Setup Part 2

Free

22m

Packers Part 3

Free

23m

Lab Setup Part 3

Free

19m

Intro Part 3

Free

8m

Dynamic Analysis Part 1.3

Free

14m

Packers Part 4

Free

25m

Basic Static Analysis Part 4A

Free

32m

Packers Part 5

Free

8m

Basic Static Analysis Part 4B

Free

3m

Basic Static Analysis Part 5

Free

20m

Basic Static Analysis Part 6

Free

41m

Packers Part 1

20m

Module 6 - Packers
Basic Static Analysis Part 1

38m

Module 5 - Basic Static Analysis
Lab Setup Part 1

2m

Module 2 - Lab Setup
Intro Part 1

23m

Module 1 - Introduction
Dynamic Analysis Part 2.1

11m

Module 4 - Dynamic Analysis Part 2
Dynamic Analysis Part 1.1

5m

Module 3 - Dynamic Analysis Part 1
Basic Static Analysis Part 2

34m

Module 5 - Basic Static Analysis
Packers Part 2

6m

Module 6 - Packers
Dynamic Analysis Part 2.2

30m

Module 4 - Dynamic Analysis Part 2
Intro Part 2

10m

Module 1 - Introduction
Dynamic Analysis Part 1.2

26m

Module 3 - Dynamic Analysis Part 1
Lab Setup Part 2

22m

Module 2 - Lab Setup
Packers Part 3

23m

Module 6 - Packers
Lab Setup Part 3

19m

Module 2 - Lab Setup
Intro Part 3

8m

Module 1 - Introduction
Dynamic Analysis Part 1.3

14m

Module 3 - Dynamic Analysis Part 1
Packers Part 4

25m

Module 6 - Packers
Basic Static Analysis Part 4A

32m

Module 5 - Basic Static Analysis
Packers Part 5

8m

Module 6 - Packers
Basic Static Analysis Part 4B

3m

Module 5 - Basic Static Analysis
Basic Static Analysis Part 5

20m

Module 5 - Basic Static Analysis
Basic Static Analysis Part 6

41m

Module 5 - Basic Static Analysis
Course Description

About this Online Malware Analysis / Reverse Engineering Training

If you've been looking for an intense, methodological intro training class on malware analysis, you've come to the right place. Our self-paced, online malware analysis training class provides an in-depth look into the world of malware and reverse engineering. Weaving complex methods with practical application, our training ensures the highest level of comprehension regarding identifying, isolating and defending against malware. Specifically, you'll learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics. You'll also learn about tools and techniques for "run time" (also known as dynamic) analysis, debugging and disassembling malicious binaries and network traffic analysis. Never again will you have to worry about malware harming you or your organization, because this training will provide you with all of the knowledge you need to know to combat it. Malware doesn't have to be your problem. Start our online malware analysis training today.

CEU / CPE: 9

Total Clock Hours: 9 hrs, 10 mins

If you enjoy this course, be sure to learn [advanced hacking with Georgia Weidman](https://www.cybrary.it/course/advanced-penetration-testing/)!

In this online Malware analysis course, you will learn basic information about malware and reverse engineering. You will learn terminology, and obtain a solid understanding of viruses, worms, ransomware, Trojans, and other cyber threats.

What is Malware Analysis?

Malware, a shortened version of malicious software, is a term that encompasses multiple types of malicious programs that are created by cyber criminals. In today’s technologically advanced world, more and more individuals and organizations are becoming victims of cyberattacks online. The size of the entity doesn’t seem to matter, cyber criminals are not particularly picky.

These malicious programs often allow a backdoor entry into computer and network systems allowing criminals to steal personal information, sensitive data, and more. Additionally, these attacks are ever-increasing, which means that there is a demand for professionals who understand malware, how to combat it, and how to prevent it. Malware analysis is a key part of preventing cyberattacks from occurring.

Why Is Malware Analysis Needed?

Malware analysis, the process by which the functions and purposes of specific malware programs are determined and analyzed, used to be a manual and time-consuming process, even as recently as 15 to 20 years ago. However, due to the massive increase in malware threats and attacks, the demand for efficient, time-effective, and technologically advanced analysis procedures has grown exponentially.

Malware analysis is essential to understanding how to detect malicious codes and is a crucial component for developing effective malware removal tools for infected systems.

What Is Covered in this Malware Analysis Course?

In Cybrary’s Malware analysis course, you will cover the basic information about different types of malware, including viruses, worms, ransomware, Trojans, and other cyber threats. We employ a hands-on approach, using labs, to introduce students to malware and the terminology they need to know.

This malware analysis training is designed for individuals at a beginner level in information technology and doesn’t have any prerequisites. It’s perfect for students who are planning to study and sit for certification exams like the Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP certification, as the skills and knowledge gained in this course will help students prepare for these examinations.

How Do You Get Started in Malware Analysis?

Learning about malware analysis is a great start of a new cybersecurity career, or an excellent way to advance a beginning IT career. It’s both challenging and rewarding and isn’t often the same tasks day after day. While cybersecurity professionals who deal with malware analysis can test one’s patience and concentration, when the key piece of data or function is found, there is nothing like the payoff that’s felt.

The future for cybersecurity careers has never been more favorable. It’s truly a job-seeker’s market right now. There are far more open cybersecurity positions than there are qualified professionals to fill them. Many cybersecurity jobs have very lucrative salaries, especially those that are filled by professionals with even a few years of experience under their belts. Additionally, the future generations of IT and cybersecurity professionals will need to have advanced knowledge of malicious software and programs to fight the more advanced cyber criminals of tomorrow.

What Are the Types of Malware Analysis?

There are three major types of malware analysis – static, dynamic, and threat analysis.
  • Static Analysis – This type of analysis, sometimes called static code analysis, is a process of debugging software without having to execute the program or code.
  • Dynamic Analysis – This type of analysis actually runs malware to determine its behavior, recognize technical indicators, and learn the functionality of the program.
  • Threat Analysis – This type of analysis is an on-going process that identifies paradigms of malicious programs and software.
  • Ready to start this malware analysis course? Signup today!

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    No items found.
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    Intro to Malware Analysis and Reverse Engineering

    Are you on the path to becoming a SOC Analyst or preparing for your CEH exam? This malware analysis course will help you advance your career and protect your organization from critical threats. Learn how to perform analysis on all major files types, carve malicious executables from documents, and recognize common malware tactics.
    9
    10
    M
    Time
    advanced
    difficulty
    9
    ceu/cpe

    Course Content

    Course Description

    About this Online Malware Analysis / Reverse Engineering Training

    If you've been looking for an intense, methodological intro training class on malware analysis, you've come to the right place. Our self-paced, online malware analysis training class provides an in-depth look into the world of malware and reverse engineering. Weaving complex methods with practical application, our training ensures the highest level of comprehension regarding identifying, isolating and defending against malware. Specifically, you'll learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics. You'll also learn about tools and techniques for "run time" (also known as dynamic) analysis, debugging and disassembling malicious binaries and network traffic analysis. Never again will you have to worry about malware harming you or your organization, because this training will provide you with all of the knowledge you need to know to combat it. Malware doesn't have to be your problem. Start our online malware analysis training today.

    CEU / CPE: 9

    Total Clock Hours: 9 hrs, 10 mins

    If you enjoy this course, be sure to learn [advanced hacking with Georgia Weidman](https://www.cybrary.it/course/advanced-penetration-testing/)!

    In this online Malware analysis course, you will learn basic information about malware and reverse engineering. You will learn terminology, and obtain a solid understanding of viruses, worms, ransomware, Trojans, and other cyber threats.

    What is Malware Analysis?

    Malware, a shortened version of malicious software, is a term that encompasses multiple types of malicious programs that are created by cyber criminals. In today’s technologically advanced world, more and more individuals and organizations are becoming victims of cyberattacks online. The size of the entity doesn’t seem to matter, cyber criminals are not particularly picky.

    These malicious programs often allow a backdoor entry into computer and network systems allowing criminals to steal personal information, sensitive data, and more. Additionally, these attacks are ever-increasing, which means that there is a demand for professionals who understand malware, how to combat it, and how to prevent it. Malware analysis is a key part of preventing cyberattacks from occurring.

    Why Is Malware Analysis Needed?

    Malware analysis, the process by which the functions and purposes of specific malware programs are determined and analyzed, used to be a manual and time-consuming process, even as recently as 15 to 20 years ago. However, due to the massive increase in malware threats and attacks, the demand for efficient, time-effective, and technologically advanced analysis procedures has grown exponentially.

    Malware analysis is essential to understanding how to detect malicious codes and is a crucial component for developing effective malware removal tools for infected systems.

    What Is Covered in this Malware Analysis Course?

    In Cybrary’s Malware analysis course, you will cover the basic information about different types of malware, including viruses, worms, ransomware, Trojans, and other cyber threats. We employ a hands-on approach, using labs, to introduce students to malware and the terminology they need to know.

    This malware analysis training is designed for individuals at a beginner level in information technology and doesn’t have any prerequisites. It’s perfect for students who are planning to study and sit for certification exams like the Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP certification, as the skills and knowledge gained in this course will help students prepare for these examinations.

    How Do You Get Started in Malware Analysis?

    Learning about malware analysis is a great start of a new cybersecurity career, or an excellent way to advance a beginning IT career. It’s both challenging and rewarding and isn’t often the same tasks day after day. While cybersecurity professionals who deal with malware analysis can test one’s patience and concentration, when the key piece of data or function is found, there is nothing like the payoff that’s felt.

    The future for cybersecurity careers has never been more favorable. It’s truly a job-seeker’s market right now. There are far more open cybersecurity positions than there are qualified professionals to fill them. Many cybersecurity jobs have very lucrative salaries, especially those that are filled by professionals with even a few years of experience under their belts. Additionally, the future generations of IT and cybersecurity professionals will need to have advanced knowledge of malicious software and programs to fight the more advanced cyber criminals of tomorrow.

    What Are the Types of Malware Analysis?

    There are three major types of malware analysis – static, dynamic, and threat analysis.
  • Static Analysis – This type of analysis, sometimes called static code analysis, is a process of debugging software without having to execute the program or code.
  • Dynamic Analysis – This type of analysis actually runs malware to determine its behavior, recognize technical indicators, and learn the functionality of the program.
  • Threat Analysis – This type of analysis is an on-going process that identifies paradigms of malicious programs and software.
  • Ready to start this malware analysis course? Signup today!

    This course is part of a Career Path:
    Become an Incident Handler
    In this Career Path, you will learn the incident response process, from building an incident response kit and developing an incident response team, to identifying, containing, and recovering from incidents. We then steer away from a traditional “defensive-only” approach to introduce you to the attacker’s world.
    Incident Handler Collection

    This collection focuses on the incident response process – from building an incident response kit and developing an incident response team, to identifying, containing, and recovering from incidents. We cover the traditional “defensive-only” approach, then introduce you to the attacker’s world.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Intro to Malware Analysis and Reverse Engineering Certificate of Completion