Malware Analysis and Reverse Engineering

Course provided by Model Institute of Engineering & Technology

5 modules

Master Malware Analysis and Reverse Engineering to Detect Threats Early

5 Level NCrF 

National Credit Framework

90 Hours 

Flexible Learning

Beginner Level

No prior experience required

Micro Credic Course

03 Credit

Course Overview

This course teaches both static and dynamic malware analysis, giving students hands-on experience in dissecting malicious software. Using tools like Ghidra, IDA Free, and sandbox environments, learners perform skill-based threat deconstruction, uncover malware behavior, and understand attack techniques. By the end, students will be able to safely analyze malware, interpret its mechanisms, and apply insights to strengthen cybersecurity defenses.

Key Learning Highlights

  • Hands-on experience with Ghidra and IDA Free for reverse engineering.

  • Learn static and dynamic malware analysis techniques.

  • Analyze malware behavior using sandbox environments.

  • Understand attack methodologies and malware propagation.

  • Develop practical skills in threat deconstruction and incident investigation.

  • Apply knowledge to strengthen cybersecurity defenses.

Tools & Platforms Used

Ghidra
IDA Free
Sandbox
OllyDbg
Wireshark
Cuckoo Sandbox

Learning Outcome

By the end of this course, students will be able to:

  • Set up a secure lab environment for malware analysis using virtual machines.
  • Perform static analysis of malware samples using basic tools and techniques.
  • Conduct dynamic analysis to observe malware behavior in controlled environments.
  • Use reverse engineering tools for code analysis.
  • Analyze different malware types and generate analysis reports with findings.

Master the course with just 5 Modules

This course takes learners from the fundamentals of malware and reverse engineering to advanced threat analysis. Beginning with malware types and static analysis, participants progress through dynamic sandboxing, debugging, and network monitoring. The journey concludes with hands-on malware dissection and applying findings to strengthen cybersecurity defenses.

Malware Analysis Fundamentals and Lab Setup
  • Introduction to malware types, analysis process overview, setting up virtual machines, Flare-VM installation, REMnux setup, safety considerations.
  • File properties examination, string analysis, packer detection, hash calculation, metadata extraction, basic obfuscation identification.

  • Runtime behavior observation, network traffic analysis, file system monitoring, registry changes, process monitoring, sandboxing techniques. 
  • Disassembly techniques, assembly language basics, control flow analysis, function identification, code decompilation, debugging methods.
  • Analyzing PowerShell scripts, JavaScript malware, macro-enabled documents, ELF files, webshells, JAR files, report generation.

Roles

  • Malware Analyst

  • Reverse Engineer

  • Threat Intelligence Analyst

  • Cybersecurity Researcher

  • SOC Analyst (Advanced)

Related Courses

Are you ready to take the next step toward your career?