Malware Reverse Engineering builds on the knowledge and skills from earlier courses in the track and teaches students how to perform more advanced analysis of real-world malware samples. The primary techniques taught are disassembly and debugging. The course also covers topics such as data decoding and binary obfuscation in order to bypass protections and perform effective analysis on hardened samples, how to deal with destructive malware, and how to defeat anti-debugging and other anti-analysis techniques.
This is an intense debugging and disassembly course. Significant experience with assembly language is required to fully benefit from this course. C Programming and Assembly for Reverse Engineers are recommended prerequisites for those lacking programming and assembly experience.