Malware Analysis syllabus:
Introduction to Malware Analysis :
1.Taxonomy of Malware
2.Threats of Malware
3.Analysis Methodologies of Malware
4.Legal Considerations
5.Protecting and Identifying against Malware
Malware Hiding Places:
1..Collecting Malware from Live system
2.Identifying Malware in Dead system
Building a Malware Analysis Lab (Environment):
1.Virtual Machine
2.Real Systems
3.Malware Analysis Tools
Static Analysis:
1.Detail of File Analysis
2.File Hashes of database
3.Identifying File Compile Date
4.Obfuscation Methods/Identifying Packing
5.Performing Strings
6.File Signature Analysis
7.Online and Local Malware Scanning
8.Identifying File Dependencies
Dynamic Analysis:
1.System Guideline
2.Host Integrity Monitor
3.Monitor of Installation
4.Monitor of Process
5.Monitor of File
6.Registry Monitoring/Analysis
7.Network Traffic Monitoring/Analysis
8.Port Monitor
9.DNS Resolution/Monitoring
10.Simulation Internet Services
Code Analysis:
1.Reverse Engineering Malicious Code
2.Identifying Malware Passwords
3.Bypassing Authorization
Malicious Document Analysis:
1.Microsoft Office Document Structures and PDF
2.Office Documents Vulnerabilities and PDF
3.Analysis Tools and Malware Extraction
4. Analysis of Malicious Documents
Malware Challenges:
1.Virtual Environment
2.Live Internet Connection
3.Fake, Real and Virtual Services
4.Anti-forensic and Anti-Debug Malware