Juniata Classifieds>Juniata Online Courses>Malware Analysis and Assembly Language Introduction

Malware Analysis and Assembly Language Introduction

About this Course

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking systems. Malware analysis dissects malware to gather information about the malware functionality, how the system was compromised so that you can defend against future attacks. Assembly is a low-level language that is used to communicate with the machine. Assembly programming is writing human-readable machine codes or machine instructions that are directly read by the computer. All high-level languages compiled programs like C or C++ can be broken down, analyzed, and understood using Assembly language with the help of a debugger. This process is known as reverse engineering. Understanding what an executable program does is easy if you have direct access to the source code. But if not, such as the case with malware, learning Assembly can be helpful.

Created by: IBM

Level: Introductory


Related Online Courses

In this course, we start with some services where the training model and raw inference is handled for you by Amazon. We'll cover services which do the heavy lifting of computer vision, data... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
This is CS50’s introduction to computer science for business professionals, designed for managers, product managers, founders, and decision-makers more generally. Whereas CS50 itself takes a b... more
Deploying and managing applications securely and efficiently is critical in today's technology organizations. As a result, organizations are turning to Kubernetes to run their workloads, only to... more
In modern cloud native application development, it’s often times the goal to build out serverlessarchitectures that are scalable, are highly available, and are fully managed. This mean, less o... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL