• Classroom
Course Description
  • Learn how to analyze malware, including computer viruses, trojans, and rootkits, using basic static analysis and dynamic analysis, including IDA Pro and other tools.

Learning Objectives

  1. Describe types of malware, including rootkits, Trojans, and viruses.
  2. Perform basic static analysis with antivirus scanning and strings.
  3. Perform malware analysis in virtual machines.
  4. Perform basic dynamic analysis with a sandbox.
  5. Use IDA Pro to analyze assembly code and malicious Windows programs.
  6. Use OllyDbg and Win Dbg effectively.
  7. Analyze malware behavior and covert malware launching techniques.
  8. Implement and reverse data encoding methods.
  9. Use malware-focused network signatures.
  10. Describe anti-reverse-engineering methods.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Operations
  • Digital Forensics
  • Exploitation Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.