Malware Analysis syllabus:

Introduction to Malware Analysis :

1.Taxonomy of Malware

2.Threats of Malware 

3.Analysis Methodologies  of Malware 

4.Legal Considerations

5.Protecting and Identifying against Malware

Malware Hiding Places:

1..Collecting Malware from Live system

2.Identifying Malware in Dead system   

  Building a Malware Analysis Lab (Environment):

1.Virtual Machine

2.Real Systems

3.Malware Analysis Tools

Static Analysis:

1.Detail of  File Analysis

2.File Hashes of database

3.Identifying File Compile Date

4.Obfuscation Methods/Identifying Packing

5.Performing Strings

6.File Signature Analysis

7.Online and Local  Malware Scanning

8.Identifying File Dependencies

Dynamic Analysis:

1.System Guideline                                                      

2.Host Integrity Monitor

3.Monitor of Installation  

4.Monitor of Process

5.Monitor of File

6.Registry Monitoring/Analysis

7.Network Traffic Monitoring/Analysis

8.Port Monitor

9.DNS Resolution/Monitoring

10.Simulation Internet Services

Code Analysis:

1.Reverse Engineering Malicious Code

2.Identifying Malware Passwords

3.Bypassing Authorization

Malicious Document Analysis:

1.Microsoft Office Document Structures and PDF

2.Office Documents Vulnerabilities and PDF

3.Analysis Tools  and Malware Extraction

4. Analysis of Malicious Documents

Malware Challenges:

1.Virtual Environment

2.Live Internet Connection

3.Fake, Real  and Virtual Services

4.Anti-forensic and Anti-Debug  Malware