Online Resources: Courses, Videos, Workshops and Blogs

Internet if full or resources where to learn about different topics, and with an enormous amount regarding Information Security and specifically Malware Analysis. As I don’t tend to write another Malware Analysis training (I did that when I was at ESET), I’ll share a list of really valuable content and some of the resources that I believe have actionable and specific content for you to go through.

In my opinion for a resource to be really helpful it should include lectures, reading, source code or samples and practice, lot’s of practice. One of the most important thing you’ll need to achieve for Reversing Malware it’s actually reversing a lot of samples and also your own code while you’re ramping up.

Open Security Training

From the many resources available I always point peers and people to one of the most useful sites I’ve found about a lot of security topics: Open Security Training. The content on this site covers a wide and detailed list of resources for any Security Enthusiast from x86, Cryptography, Network Detection, ARM, Malware Analysis, Exploiting to Cellular Networks and even more.

Courses are at least one day long, and slides, samples and videos are available for you to go through at you own pace. Some of the courses that I recommend for anyone Interested in Malware Analysis include:

Beginner classes

Intro to x86 — http://opensecuritytraining.info/IntroX86.html

Intro to x86–6 — http://opensecuritytraining.info/IntroX86-64.html

Life of Binaries — http://opensecuritytraining.info/LifeOfBinaries.html

Malware Dynamic Analysis — http://opensecuritytraining.info/MalwareDynamicAnalysis.html

Intermediate Classes

Introduction to Software Exploits — http://opensecuritytraining.info/Exploits1.html

Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration — http://opensecuritytraining.info/IntermediateX86.html

Advanced Classes

Introduction to Reverse Engineering Software: http://opensecuritytraining.info/IntroductionToReverseEngineering.html

Reverse Engineering Malware — http://opensecuritytraining.info/ReverseEngineeringMalware.html

Rootkits: What they are, and how to find them — http://opensecuritytraining.info/Rootkits.html

The Adventures of a Keystroke: An in-depth look into keyloggers on Windows — http://opensecuritytraining.info/Keylogging.html

Workshops and

While looking at some more content in the Web you’ll cross with different Workshops that contains a really hands on approach and will guide you to specific topics. Some of these topics are covered in books, and some are not. This is not a fully extended list but will give you some examples about where to start: