ESU Classifieds>ESU Online Courses>Malware Analysis and Assembly Language Introduction

Malware Analysis and Assembly Language Introduction

About this Course

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking systems. Malware analysis dissects malware to gather information about the malware functionality, how the system was compromised so that you can defend against future attacks. Assembly is a low-level language that is used to communicate with the machine. Assembly programming is writing human-readable machine codes or machine instructions that are directly read by the computer. All high-level languages compiled programs like C or C++ can be broken down, analyzed, and understood using Assembly language with the help of a debugger. This process is known as reverse engineering. Understanding what an executable program does is easy if you have direct access to the source code. But if not, such as the case with malware, learning Assembly can be helpful.

Created by: IBM

Level: Introductory


Related Online Courses

Join the future of language technology with ‘Introduction to ChatGPT’, taught by Global Online Educator, Mike Wheeler. This course covers everything you need to know about the state-of-the-art lan... more
Ergonomics is the application of scientific information about people in order to design products and systems so that they are safe, productive, comfortable and healthy for people to use. People... more
This course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. The series of courses is... more
Within this course, you’ll learn about how PostgreSQL creates and uses inverted indexes for JSON and natural language content. We will use various sources of data for our databases, including a... more
Vulnerabilities can occur at any stage of software development, making it critical for developers to write secure code and maintain a secured development environment and the platform it runs on. In... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL