Dissect malicious software safely. Master static and dynamic analysis, assembly basics, and reverse engineering to understand how malware works.
When antivirus fails, you need to know what the code is doing. This course teaches you to reverse engineer malware in a safe, isolated lab environment. You will perform Static Analysis to extract strings and signatures without running code, and Dynamic Analysis to observe behavior (registry changes, network beacons) while the malware runs. We cover x86 Assembly basics and using debuggers/disassemblers like Ghidra and IDA Pro to analyze compiled binaries.
Estimated completion time: 21 lessons • Self-paced learning • Lifetime access
We teach strict sandboxing to prevent infection.
Assembly is challenging; requires patience.
Ghidra is free (NSA); IDA Pro is expensive.
Reading code (C/Assembly) is required.