Malware Analysis and Reverse Engineering
Course provided by Model Institute of Engineering & Technology
5 modules
Master Malware Analysis and Reverse Engineering to Detect Threats Early
5 Level NCrF
National Credit Framework
90 Hours
Flexible Learning
Beginner Level
No prior experience required
Micro Credic Course
03 Credit
Course Overview
This course teaches both static and dynamic malware analysis, giving students hands-on experience in dissecting malicious software. Using tools like Ghidra, IDA Free, and sandbox environments, learners perform skill-based threat deconstruction, uncover malware behavior, and understand attack techniques. By the end, students will be able to safely analyze malware, interpret its mechanisms, and apply insights to strengthen cybersecurity defenses.
Key Learning Highlights
Hands-on experience with Ghidra and IDA Free for reverse engineering.
Learn static and dynamic malware analysis techniques.
Analyze malware behavior using sandbox environments.
Understand attack methodologies and malware propagation.
Develop practical skills in threat deconstruction and incident investigation.
Apply knowledge to strengthen cybersecurity defenses.
Tools & Platforms Used
Learning Outcome
By the end of this course, students will be able to:
- Set up a secure lab environment for malware analysis using virtual machines.
- Perform static analysis of malware samples using basic tools and techniques.
- Conduct dynamic analysis to observe malware behavior in controlled environments.
- Use reverse engineering tools for code analysis.
- Analyze different malware types and generate analysis reports with findings.
Master the course with just 5 Modules
This course takes learners from the fundamentals of malware and reverse engineering to advanced threat analysis. Beginning with malware types and static analysis, participants progress through dynamic sandboxing, debugging, and network monitoring. The journey concludes with hands-on malware dissection and applying findings to strengthen cybersecurity defenses.
Malware Analysis Fundamentals and Lab Setup
- Introduction to malware types, analysis process overview, setting up virtual machines, Flare-VM installation, REMnux setup, safety considerations.
Static Analysis Techniques
File properties examination, string analysis, packer detection, hash calculation, metadata extraction, basic obfuscation identification.
Dynamic Analysis and Behavioral Monitoring
- Runtime behavior observation, network traffic analysis, file system monitoring, registry changes, process monitoring, sandboxing techniques.
Reverse Engineering with Ghidra and IDA
- Disassembly techniques, assembly language basics, control flow analysis, function identification, code decompilation, debugging methods.
Advanced Malware Analysis
- Analyzing PowerShell scripts, JavaScript malware, macro-enabled documents, ELF files, webshells, JAR files, report generation.
Roles
Malware Analyst
Reverse Engineer
Threat Intelligence Analyst
Cybersecurity Researcher
SOC Analyst (Advanced)