|
|
Dec 26, 2024
|
|
CIS 295 - Malware Analysis
5.0 Credits This course prepares forensic analysts, information security professionals, and incident responders to reverse-engineer malicious software using practical tools and techniques. Prerequisite CIS 274 with a minimum grade of 2.5 or instructor permission. Course-level Learning Objectives (CLOs) Upon successful completion of this course, students will be able to:
- Use tools and their respective functions for the various stages of the malware analysis process.
- Deconstruct common root kit components and functions to include resident malicious code, VB Macros, Java-Script executables, and Shellcode executables.
- Apply procedures used to intercept and analyze network traffic generated by malware.
- Using virtual computing technologies, implement tools and processes used to create a lab environment for reverse-engineering malware.
- Modify malicious code to defeat anti-forensic measures contained in self-defending malware.
- Examine various formats used to pack malicious executable code, and use and select the appropriate tools for unpacking the code.
- De-obfuscate malicious code packages within executables.
- Perform static memory malware analysis from artifacts resident in Random Access Memory.
- Describe how malware utilizes Windows Operating System API functions for propagation and concealment.
- Describe how processes are translated between memory registers, memory stack, and instructions contained in software code.
Add to Personal Catalog (opens a new window)
|
|
|