Course Content

Module 1: Introduction

02:48
1.1 Introduction
05:22
1.2 Malware Introduction

Module 2: Analyze Malware

08:51
2.1 Analyze and Classify Malware Lab Part 1
03:40
2.2 Analyze and Classify Malware Lab Part 2
01:00:00
2.3 Analyze and Classify Malware
08:19
2.4 Rootkit Lab Part 1
08:30
2.5 Rootkit Lab Part 2
07:42
2.6 Rootkit Lab Part 3
02:00:00
2.7 RootKit

Module 3: Conclusion

01:55
3.1 Conclusion

Course Description

This basic course is a good starting point for students interested in both penetration testing and malware analysis. Students studying for industry certification exams, like CEH, may find the course beneficial.

Prerequisites

Students should be familiar with common IT and cybersecurity terminology.

Study Resources

The course will include a study guide and glossary. Students will also get step by step guides for all labs.

Course Goals

By the end of this course, students should be able to:

  • Explain the common types of malware
  • Analyze a malicious file

This skill-based malware analysis training course is intended to introduce students to malware, terminology, and focuses on a hands-on approach with labs. Several labs will help reinforce the learning. This course is instructed at a beginner level. Ideally, students will either be pursuing certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP, since the knowledge gained in this course will help students prepare for these examinations.

In this free, online Malware Threats training course, you will learn basic information about malware and malware analysis. You will learn terminology, and obtain a solid understanding of viruses, worms, ransomware, Trojans, and other cyber threats.

What is Malware Analysis?

Malware, a shortened version of malicious software, is a term that encompasses multiple types of malicious programs that are created by cyber criminals. In today’s technologically advanced world, more and more individuals and organizations are becoming victims of cyberattacks online. The size of the entity doesn’t seem to matter, cyber criminals are not particularly picky.

These malicious programs often allow a backdoor entry into computer and network systems allowing criminals to steal personal information, sensitive data, and more. Additionally, these attacks are ever-increasing, which means that there is a demand for professionals who understand malware, how to combat it, and how to prevent it. Malware analysis is a key part of preventing cyberattacks from occurring.

Why Is Malware Analysis Needed?

Malware analysis, the process by which the functions and purposes of specific malware programs are determined and analyzed, used to be a manual and time-consuming process, even as recently as 15 to 20 years ago. However, due to the massive increase in malware treats and attacks, the demand for efficient, time-effective, and technologically advanced analysis procedures has grown exponentially.

Malware analysis is essential to understanding how to detect malicious codes and is a crucial component for developing effective malware removal tools for infected systems.

What Is Covered in This Malware Analysis Course?

In Cybrary’s Malware Threats training course, you will cover the basic information about different types of malware, including viruses, worms, ransomware, Trojans, and other cyber threats. We employ a hands-on approach, using labs, to introduce students to malware and the terminology they need to know.

This malware analysis training is designed for individuals at a beginner level in information technology and doesn’t have any prerequisites. It’s perfect for students who are planning to study and sit for certification exams like the Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP certification, as the skills and knowledge gained in this course will help students prepare for these examinations.

This short Malware Threats course is 49 minutes of clock time for the included lessons. Upon finishing the course, you will have earned 1 CEU/CPE and you will receive a Certificate of Completion.

How Do You Get Started in Malware Analysis?

Learning about malware analysis is a great start of a new cybersecurity career, or an excellent way to advance a beginning IT career. It’s both challenging and rewarding and isn’t often the same tasks day after day. While cybersecurity professionals who deal with malware analysis can test one’s patience and concentration, when the key piece of data or function is found, there is nothing like the payoff that’s felt.

The future for cybersecurity careers has never been more favorable. It’s truly a job-seeker’s market right now. There are far more open cybersecurity positions than there are qualified professionals to fill them. Many cybersecurity jobs have very lucrative salaries, especially those that are filled by professionals with even a few years of experience under their belts. Additionally, the future generations of IT and cybersecurity professionals will need to have advanced knowledge of malicious software and programs to fight the more advanced cyber criminals of tomorrow.

What Are the Types of Malware Analysis?

There are three major types of malware analysis – static, dynamic, and threat analysis.

  • Static Analysis – This type of analysis, sometimes called static code analysis, is a process of debugging software without having to execute the program or code.
  • Dynamic Analysis – This type of analysis actually runs malware to determine its behavior, recognize technical indicators, and learn the functionality of the program.
  • Threat Analysis – This type of analysis is an on-going process that identifies paradigms of malicious programs and software.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Virtual Labs to gain hands on experience and apply what you learned

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Malware Threats Certificate of Completion