Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Malware Analysis: Identifying and Defeating Code Obfuscation

Course Cover
compare button icon

Course Features

icon

Duration

142 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

142 minutes

Course Description

Obfuscation techniques are used by malware authors to make it difficult to analyze their code. These techniques can be used to hide important indicators of compromise, and reduce the ability of malware functionality to be identified. This course Malware Analysis: Identifying, Destroying and Countering Code Obfuscation will teach you how to identify common obfuscation methods, as well as how to defeat them. You will first learn how obfuscation can affect your analysis, and the best strategies to defeat a variety of different obfuscation techniques. Next, we will show you how to detect and identify obfuscation in interpreted code. This includes malware authors like Powershell and Visual Basic For Applications. Next, you will be able expand your knowledge by learning code obfuscation using native code. You will also learn how malware authors use cryptography to obfuscate code and the best ways to detect it. This course will provide hands-on labs and detailed demonstrations for each module. You will be able to analyze real malware. This course will cover malware obfuscation using tools such as WinDbg and IDA Pro. This course will equip you with the skills and knowledge to tackle obfuscation.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation!

Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware

Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it

Learning about code obfuscation in native code

You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg

Course Cover