In the first module, you'll understand how to setup a malware analysis lab. You'll learn about the various components that are involved in a typical lab setup. We'll explore a basic lab setup, involving running a local VM on a Windows local machine (referred to as the victim) and funnelling traffic through a Linux VM (called the Router). This module begins with the installations of VMware workstation, Windows XP, and finally, setup of Kali for networking.
Intro to Malware Analysis and Reverse Engineering
In this malware analysis course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.