Courses

Malware Analysis and Introduction to Assembly Language

Share this post:

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking systems.

Malware analysis dissects malware to gather information about the malware functionality, how the system was compromised so that you can defend against future attacks.  Assembly is a low-level language that is used to communicate with the machine. Assembly programming is writing human-readable machine codes or machine instructions that are directly read by the computer. All high-level languages compiled programs like C or C++ can be broken down, analyzed, and understood using Assembly language with the help of a debugger. This process is known as reverse engineering.  Understanding what an executable program does is easy if you have direct access to the source code. But if not, such as the case with malware, learning Assembly can be helpful.

In this course, through video demonstrations, hands-on reverse engineering, and capture-the-flag type activities, you will be introduced to the processes and methods for conducting malware analysis of different file types. You will analyze native executable files, and analyze popular files like PowerShell, JavaScripts, and macro-enabled documents. Then you will learn the fundamentals of Assembly language, basic Win32 Assembly programming concepts, and how Reverse Engineers use Assembly to analyze malware.

Coursera: https://coursera.org/learn/malware-analysis-and-assembly

edX: https://www.edx.org/course/malware-analysis-and-assembly-language-introduction

More Courses stories
By Divya Singal on 5 April 2024

Upskill yourself – learn how to continuously optimize hybrid cloud using IBM Turbonomic

IBM Turbonomic is a software platform that helps organizations optimize the performance and cost of their IT infrastructure, including public, private, and hybrid cloud environments. Earn IBM Turbonomic Operator 8 and IBM Turbonomic Cloud Administrator 8 badges by taking self-paced courses with labs: IBM Turbonomic Foundations (ZN901G) and IBM Turbonomic Cloud Optimization (ZN910G).  From these […]

Continue reading

By Jennifer Chen on 18 March 2024

Check out the updated courses on Sterling B2Bi Data Mapping and EDI Processing (X12)

The refreshed courses on Sterling B2Bi Data Mapping and EDI Processing are available as self-paced and instructor led courses. They introduce students to the Sterling B2B Integrator Map Editor, mapping, and the Graphical Process Modeler. During the hands-on exercises, the students create maps and business processes and process data to trade with the trading partners. […]

Continue reading

By Aparna Srivastava on 14 March 2024

Check out the new Maximo Mobile self-paced course that is now available.

Maximo Mobile: Customization Overview This course introduces you to Maximo Mobile, the applications available, the personas that use Mobile, and the functions they use it for. It also provides you an overview of Maximo Mobile customization using Maximo Application Framework. Click here to access the self-paced course information.

Continue reading