Udemy

Advanced Malware Techniques

Enroll Now
  • 15 Students
  • Updated 8/2025
4.1
(02 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
6 Hour(s) 37 Minute(s)
Language
English
Taught by
Daniel N
Rating
4.1
(02 Ratings)

Course Overview

Advanced Malware Techniques

advanced malware development techniques

In this course, I will show advanced techniques used by real malware that I have already analyzed. In practice, Analyzing malware is not that easy. First, finding a good sample is a bit tedious and, depending on the techniques and number of stages, it can take a long time. I will also be adding content related to offensive security focused on red team operations in which I have already participated, talking about infrastructure, networks, organization and computer architecture applied to this.

The course covers advanced cryptography techniques, protocol customization, process injection techniques, obfuscation, how to abuse internal Windows mechanisms to elevate privileges and escape defenses, programming command and control servers for exfiltration in multiple protocols, polymorphism and programming malware in multiple stages for each "nature" of malware, such as ransomware, worms, stealers, etc...

I would like to emphasize that this course is for more technical users who already have an idea about the topics covered, however, the main objective is to arouse a certain curiosity for research on the topics as well.

My microphone is also not one of the best, so if a class is poorly explained in a technical way or has very very very bad audio, please do not hesitate to comment so that I can re-record it, unfortunately I do not have much time for video editing, but the idea is to be technical and objective. I hope you enjoy the content, I will be doing my best.

Course Content

  • 8 section(s)
  • 17 lecture(s)
  • Section 1 Introdução
  • Section 2 Heavens Gate
  • Section 3 Process Hollowing
  • Section 4 Privilege Escalation Techniques
  • Section 5 Stealers
  • Section 6 Loaders
  • Section 7 Ransomwares & Encryption Modules
  • Section 8 ASM64 Assembly - NASM

What You’ll Learn

  • Develop Malware using advanced techniques, Little-accessed research sources, Perform case studies on real malware, Red Team Operations techniques


Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed