This course will teach the basics of Java and .NET runtimes, introduce
tools and techniques for effectively reverse engineering these binary
types, show you how to identify indicators of compromise, and get hands-on
with real world malware.
The ability to quickly and effectively analyse a wide variety of malware is a critical skill for anyone performing incident response, working in a security operations center (SOC), or analyzing malware. In this course, Analyzing Malware for .NET and Java Binaries, you will gain the skills necessary to effectively analyze Java and .NET malware. First, you will learn how .NET and Java binaries differ from other malware. Next, you will learn the tools, techniques, and workflows necessary to reverse engineer these types of binaries. Finally, you will apply everything you learned through hands-on labs in which you will analyze real-world malware. When you are finished with this course, you will have the knowledge and skills necessary to analyze .NET and Java binaries, giving you the ability to effectively investigate a wider variety of malware.
Dr. Josh Stroschein is an Assistant Professor at Dakota State University where he teaches malware analysis, software exploitation, reverse engineering, and penetration testing. Josh also works as a malware analyst for Bromium, an end-point security company and is the Director of Training for the Open Information Security Foundation (OISF).
Course Overview Hi everyone, my name is Dr. Josh Stroschein, and I want to welcome you to Analyzing Malware for. NET and Java Binaries. I am an Assistant Professor at Cyber Security at Dakota State University, senior security researcher at VDA Labs and malware analyst for Bromium. Java and. NET are commonly used by malware authors to attack our users and our computing resources. They can be used to deliver ransomware, trojans, and other information-stealing malware. In this course, we are going to learn how to quickly and effectively reverse engineer. Net and Java binaries. Some of the major topics that we will cover include how. NET and Java binaries differ from other malware, and how you could use these differences to your advantage when reversing, understand the role that the. NET framework and Java runtime play, as well as bytecode and how this will impact your analysis, learn how to master the tools needed to reverse engineer. NET and Java binaries and be able to perform exhaustive static and dynamic analysis, and finally, be able to identify and extract indicators of compromise, and use those to better protect your organization and its computing resources. By the end of this course, you will have the knowledge and skills necessary to analyze. NET and Java binaries, giving you the ability to effectively investigate a wider variety of malware. Before you begin the course, you should be familiar with the fundamentals on malware analysis. I hope you'll join me on this journey and learn how to reverse engineer malware with Analyzing Malware for. NET and Java Binaries at Pluralsight.