Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Specialized Malware: Packing and Obfuscation

Malware developers commonly use obfuscation to conceal the functionality of their malware, making it harder to analyze and defeat. This course will teach you how to overcome common obfuscation techniques.

Howard Poston - Pluralsight course - Specialized Malware: Packing and Obfuscation
Howard Poston
What you'll learn

Malware frequently has built-in defenses against analysis designed to frustrate efforts to understand its functionality and design defenses.. In this course, Specialized Malware: Packing and Obfuscation, you’ll learn to overcome common malware obfuscation techniques. First, you’ll explore packing and how to extract packed malware. Next, you’ll discover how to find imported libraries and strings concealed within an executable. Finally, you’ll learn how to defeat common anti-disassembly processes. When you’re finished with this course, you’ll have the skills and knowledge of packing and unpacking needed to analyze malware employing these techniques.

Table of contents

About the author
Howard Poston - Pluralsight course - Specialized Malware: Packing and Obfuscation
Howard Poston

Howard Poston is a freelance copywriter, course developer, and consultant. He created over 20 online courses and authored Python for Cybersecurity and Blockchain Security from the Bottom Up.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight