Work Desk

This course will take place later this year. 

Please click on the tentative booking button, and we will let you know when it takes place.

Malware Analysis 

Start Date:
Course Duration:
5 weeks
Academic Hours:
100% Online 

Malicious software, or malware, plays a part in most computer intrusion and security incidents. Any software that does something that causes harm to a user, computer, or network can be considered malware, including viruses, trojan horses, worms, rootkits, scareware, and spyware.


While the various malware incarnations do all sorts of different things, as malware analysts, we have a core set of tools and techniques at our disposal for analyzing malware.

Malware analysis is the art of dissecting malware to understand how it works, how to identify it, and how to defeat or eliminate it. And you don’t need to be an uber-hacker to perform malware analysis.

Join Our Cyber Security Community 

To get Access to better job opportunities.

On Completion, you will know about

Describe types of malware, including rootkits, Trojans, and viruses.

Perform basic static analysis with sysinternals

Perform basic dynamic analysis with a debugging

Perform advanced static analysis with IDA Pro

Explain malware behavior, including launching, encoding, and network signatures

Recognize common packers and how to unpack them

Image by Windows
Who should attend
  • Researchers, defence and law authorities

  • System, media, information security personnel


Learn from the best in the world

Full Syllabus

PE File

  • Headers

  • Sections

  • Import / Exports

  • Resources

  • CFF Explorer


  • Concept

  • Common DLLs

  • Kernel Objects

  • Ansi and Unicode

  • Suspicious APIs and their uses

Extra Static Analysis

  • Packers

    • Obfuscators

    • VMs

    • Crypters

  • RDG Packer Detector

  • Entropy
    Basic Dynamic Analysis

  • Sysinternals

  • Apimonitor

  • Wireshark

  • ApateDNS

  • InetSIM

  • Netcat

  • Sandboxes


  • Types

  • Functions

  • Pointers

  • Conditions and loops

  • " and &

  • Debugging in visual srudio
    Assembly Crash

  • Architecture (x86)

  • Memory Management

  • Registers

  • Instructions

  • Opcodes

RE Methodology

  • What is RE?

  • Approaching RE

  • Decompilers
    Debugging Methodology

  • What is debugging?

  • Approaching debugging

  • Debugger overview


  • Overview

  • Cheatsheet

  • Flirt signatures
    Malicious Techniques

  • Hooking

  • Code Injection

  • Anti VM / Debug

  • Obfuscation

  • Persistence

  • Dynamic function resolving (using APIs and using PEB)

  • Encryption

Get a call back from a
Cyber Security education Consultant
Image by Jud Mackrill
Download Syllabus 
Call us 1300 783 985

Head Office:
Perth, Western Australia

Learn from the best in the world

  • ioti cyber security courses

For news and updates, subscribe to our newsletter today

© 2021 by Unleash Design. Proudly created with