Fireeye Mandiant Malware Analysis Course

Fireeye Mandiant Malware Analysis Course
English | Tutorial | Size: 9.91 GB

This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, hands-on approach. The course explains how to find the functionality of a program by analyzing disassembly and seeing how it modifies a system and its resources as it runs in a debugger.

The course discusses how to extract host- and network-based indicators from a malicious program. It also covers dynamic analysis and the Windows APIs most often used by malware authors. Each section includes in-class demonstrations and hands-on labs with real malware so learners can apply their new skills.
Learning Objectives

After completing this course, learners should be able to:

Quickly perform a malware autopsy
Understand basic yet effective methods for analyzing running malware in a safe environment, such as virtual machines
Understand the basics of the x86 assembly language
Use IDA Pro, the main tool for disassembly analysis
Understand a wide range of Windows-specific concepts that are relevant to analyzing Windows malware
Monitor and change malware behavior, as it runs, at a low level

Who should attend

Software developers, information security professionals, incident responders, computer security researchers, corporate investigators and others who need to understand how malware operates and the processes involved in performing malware analysis.

Excellent knowledge of computer and operating system fundamentals. Computer programming fundamentals and Windows Internals experience are highly recommended.
Delivery method

In-classroom or virtual instructor-led training

Buy Long-term Premium Accounts To Support Me & Max Speed



If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.