The ability to analyze malware has become a necessary skill for anyone performing incident response. This course will teach the skills required to properly, quickly, and safely analyze malware by examining both its characteristics and behavior.
Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you'll gain the ability to analyze malware. First, you'll explore how to keep yourself and your systems safe when analyzing malware. Next, you'll discover how to get information on the malware by examining its characteristics. Finally, you'll learn how to execute malware and watch how it interacts with your system. When you're finished with this course, you'll have the skills and knowledge of malware analysis needed to safely and successfully determine what a malware sample does and the risk it presents.
Tyler Hudak has more than 15 years of experience performing malware analysis, computer forensics, and incident response for multiple organizations. He loves sharing the knowledge he has gained on these topics in his presentations and classes!
Hi there, my name is Tyler Hudak and welcome to my course, Malware Analysis Fundamentals.
I’m an incident responder that has taught malware analysis to hundreds of people for many years now. I love what I do, and am passionate when it comes to malware analysis.
In almost every incident that I’ve worked, malware has been part of it in some form or fashion, and having the ability to analyze that malware has made my job a ton easier.
A lot of people think that malware analysis is hard to learn, but I put together this course to show you it’s not. Anyone can do it, and I’m going to prove it to you!
In this course, we’re going to learn how to safely analyze malware so we can figure out what it does.
Some of the major topics that we will cover include:
How to set up a safe environment to analyze malware in
What clues can be obtained from examining the malware’s characteristics
How to watch the malware’s behavior to see what it does when it runs
By the end this course, you’ll know the common tools and techniques that are used by incident responders everywhere to analyze malware.
Before beginning the course you should be familiar with the basics of Windows and setting up a virtual machine.
I hope you’ll join me on this journey to learn malware analysis with the malware analysis fundamentals course, here at Pluralsight.