The Art of Malware Analysis
by Ahmed Kasmani
Learn reverse engineering, build a primary skill or add an additional skill giving you an edge.
The Art of Malware Analysis is a course on malware reverse engineering targeted toward beginners and intermediate individuals.
Course Curriculum
Module 1 – Introduction
-
Course Introduction
Course Resources
-
Course Virtual Machine – Virtual Box
-
Course Virtual Machines – VMWARE
-
Course Samples
-
Course Discord Channel
-
Misc Resources
Module 2 – Lab Setup – VMWARE
-
Part 1 – FlareVM Installation on VMWARE
-
Part 2 – Remnux Installation – VMWARE
-
Part 3 – Office Installation for Module 7
-
Part 4 – Connect VMs – VMWARE
Module 2 – Lab Setup – VirtualBox
-
Part 1 – Windows Installation
-
Part 2 – FlareVM Installation
-
Part 3 – FlareVM Software Installation
-
Part 4 – Remnux Setup
-
Part 5 – Connect both VMs
Module 3 – Basic Static And Dynamic Analysis
-
Part 1 – Basic Static Analysis – Theory
-
Part 2 – Basic Static Analysis – Labs
-
Part 3 – Basic Dynamic Analysis – Theory
-
Part 4 – Basic Dynamic Analysis-Labs
-
ToolsReview-Part1 (FREE PREVIEW)
-
ToolsReview-Part2 (FREE PREVIEW)
Module 4 – Introduction to Assembly Language
-
Part 1 – Intro to Assembly – Theory
-
Part 2 – Intro to Assembly – Lab 1
-
Part 3 – Intro to Assembly – Labs2 And Closing
Module 5 – Understanding C Programming Constructs
-
Part 1 – Understanding C – Theory (FREE PREVIEW)
-
Part 2 – Hello World in C
-
Part 3 – 1 – If than else
-
Part 3 – 2 – For Loop
-
Part 3 – 3 – While Loops
-
Part 3 – 4 – Switch Statement
-
Part 3 – 5 – Strings And Structs
-
Part 3 – 6 – Functions
-
Part 3 – 7 – Evasion and Closing (FREE PREVIEW)
Module 6 – Introduction to MITRE ATT&CK
-
Introduction to MITRE ATT&CK
Module 7 – Malicious Documents and Scripts
-
Part 1 – Malicious Document and Scripts – Theory and Labs Part 1
-
Part 2 – Malicious Document and Scripts Labs Part 2 and Closing
Module 8 – Process Injection and Packing
-
Part 1 – Process Injection Theory and Labs
-
Part 2 – Malware Packing Theory and Labs
Module 9 – Advanced Sample Analysis – Simda
-
Part 1 – Static Analysis and Unpacking of Initial Sample
-
Part 2 – Static Analysis of Unpacked Sample
-
Part 3 – Static Analysis in Ghidra – Host Finger Printing and Hashing
-
Part 4 – Static Analysis in Ghidra – Malware Evasion
-
Part 5 – Static Analysis in Ghidra – Investigating C2 Communication
-
Part 6 – Create Mitre Attack Mapping
Module 10 – Automation with Python
-
Part 1 – Introduction and using the PEFile Module
-
Part 2 – ASKBot Config Extraction
-
Part 3 – Revil Config extraction
-
Part 4 – Download and Extract Samples
-
Part 5 – Dump and Extract Configs
Module 11 – Reverse Engineering Shellcode
-
Shellcode Analysis
Module 12 – Decompilable Malware Analysis – .Net
-
Agent Tesla Analysis
Module 13 – Yara Rules and Reporting
-
Part 1 – Introduction to Yara
-
Part 2 – Creating an example Yara Rule
-
Part 3 – Reporting
Course Finale
-
Final Exercise
Bonus Module 1 – ICEID
-
Initial Execution (FREE PREVIEW)
-
Dll Analysis and Unpacking
-
Final Payload Analysis
-
C2 Extraction via Python
Bonus Module 2 – Qakbot Dropper Analysis – Campaign Obama258
-
Dropper Analysis (FREE PREVIEW)
Course Info
- Price : $149.99
- Lessons : 63
- Duration : 11 hours
About the Author
Course Instructor
Ahmed Kasmani
Hi! I am Ahmed! I am currently working as Research Lead in Fortune 500 Company, where I reverse engineer malware and perform security research to understand attacker behavior. I have worked in Microsoft and CrowdStrike in Security Research, Security Engineering and Managed Detection and Response team. I have been working in Cyber Security industry for more than 15 years. I am passionate about making Cyber Security accessible to everyone. Through my course/s, my YouTube channel and social media I share what I am working on, support people in this wonderful field. I have spent a significant portion of my career on the front line. During this time, I have had the opportunity to work on major cybersecurity incidents, including WannaCry, NotPetya, Solar Winds, Proxy Shell, and others. Additionally, I have successfully protected numerous clients from major ransomware attacks. I am always happy to share my knowledge through social media, my YouTube channel and I have lately started working on accessible Cyber Security Courses. I understand that most of the courses out there are expensive, which is why this academy is solely focused on creating comprehensive courses which are affordable for our students.
FAQ
This course teaches the process of examining malicious software to understand how it works in a safe manner. With the growing number of cyber threats, the ability to analyze and understand malware is becoming an essential skill for professionals working in the cybersecurity industry. By taking this course, you can gain the knowledge and skills required to analyze different types of malware, identify their behavior and characteristics, and develop effective strategies for preventing and mitigating attacks. This knowledge can be valuable for anyone working in areas such as network security, incident response, and forensic investigation, as well as for those interested in pursuing a career in cybersecurity.
Individuals who respond to incidents involving malware and wish to improve their understanding of malicious programs. Professionals who have some experience in malware analysis and want to enhance their knowledge and formalize their skills in this area. Forensic investigators and IT professionals who want to broaden their skill set and learn how to play a crucial role in the incident response process. A malware analysis course would provide these individuals with the knowledge and skills necessary to effectively analyse and understand different types of malware. This understanding can help these professionals to develop more effective strategies for preventing and mitigating attacks, ultimately helping to improve the overall security posture of their organisation.
Yes the course is updated regularly. Since the launch the course has been updated twice with supplemental material.
No, the course does not expire. You will have life time access.
Want to stay in the loop?
From time to time we might reach out to let you know about new courses or exclusive discounts. Sign up to our mailing list so you don’t miss out!
No spamming, pinky promise.