Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Almost every system or network breach involves a Trojan, backdoor, virus, or rootkit. Incident responders (or Malware Analysts) perform appropriate malware analysis in order to fix the current infections and prevent any future ones. According to the Verizon Data Breach Report 2015, "70-90% of malware samples are unique to an organization". There are 7 Modules in the Malware Analysis and Reverse Engineering course. The course begins with an introduction of the Malware Analysis approach and how it is useful in preventing security breaches. While going through this course, you'll learn about several tools and methodologies used to perform malware analysis on systems using typical, advanced, and/or hands on approach. You'll understand the various types of malware, their features, and how they are different from each other. The class also covers the various types of analysis, such as dynamic, static, and hybrid state/dynamic analysis, which are used to detect malware in a system or a network. The Malware Analysis course covers a wide range of topics such as Windows Malware Analysis, Basic Forensics, Incident Response, Malware Discovery, and Basic Reverse Engineering. Note that neither programming experience nor knowledge of assembly is required to benefit from the course. However, it is advisable to have a general idea about the following topics: - Networking – TCP/IP - Operating System Internals - Programming (C/C++) - Software Vulnerabilities - Hacking