Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Malware Analysis: Assembly Basics

via Pluralsight

Overview

Learning tools such as IDA Pro and Ghidra starts with understanding assembly. This course will teach you the basics of the assembly language to get started as a reverse engineer!

Reverse engineering unlocks the hidden world of malware, revealing its true intentions and providing irrefutable evidence. In this course, Malware Analysis: Assembly Basics, you'll be equipped with the foundational knowledge of assembly language, the key to wielding powerful tools like IDA Pro and Ghidra. First, you’ll demystify machine code and understand why reverse engineering is essential for malware analysis. You’ll become familiar with low-level instructions and how the CPU operates. Next, you’ll learn how to recognize common data and control structures in assembly, allowing you to identify key program functionality. Finally, you’ll solidify your understanding by building simple assembly programs yourself. When you’re finished with this course you’ll have the skills and knowledge necessary to begin your journey to become a reverse engineer.

Syllabus

  • Course Overview 1min
  • Demystifying CPU Architecture and Number Systems 24mins
  • Learning the Building Blocks of Assembly 26mins
  • Common Code Structures 36mins

Taught by

Josh Stroschein

Reviews

4.7 rating at Pluralsight based on 13 ratings

Start your review of Malware Analysis: Assembly Basics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.