The goal of this course is to cover basic techniques and tools for reverse engineering and malware analysis. As the name suggests, in this class we will only consider the Windows environment, as it is the most commonly used and abused environment.
Do not worry! Neither professional programming experience nor knowledge of assembly language is required to complete the course. If you already know this, it would be helpful when we look at defining encryption algorithms and bypassing the virtualization protection checks.
To get the most out of this course, we recommend trying all the exercises and assignments that follow the lectures, and if the concept or idea is not fully explained or clearly understood, either ask questions in the Q&A section or refer to online resources.
Who is this course for:
- Safety testers
- Malware analysts
- System Administrators
- Information Security Students
What will you learn:
- How to create a virtual environment for malware analysis
- How to identify and bypass virtualization protection methods
- Be able to analyze processes and perform low-level API monitoring
- How to track changes in the registry and file system