Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Intro to Malware Analysis

Premium room

What to do when you run into a suspected malware.

medium

90 min

44,003

User profile photo.

To access material, start machines and answer questions login.

Image of a person reacting in fear as malware emerges from a laptop screenEvery once in a while, when working as a analyst, you will encounter content (a file or traffic) that appears suspicious, and you will need to determine whether it is malicious. It is normal to feel confused with all the mixed signals such content provides. This becomes a little overwhelming for somebody just starting in cyber security, and it is common to begin questioning oneself. Knowing what steps to take to resolve such a scenario is helpful. This room will outline some steps to help you make an initial conclusion about a particular suspicious file.

Learning Objectives

  • Understand what malware is.
  • Use common tools and resources to assist your investigations.
  • Perform basic static and .
  • Set up a safe environment for analysis.

Prerequisites

So let's get started!

Answer the questions below
Let's learn Malware Analysis!

Ready to learn Cyber Security?

The Intro to Malware Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.