This is a fast-paced course designed to take you deep into malware operations – from delivery methods to payloads! Each day will end with comprehensive analysis activities and exercises to test and reaffirm key learning objectives. This course is designed to not just simply be 2 days of lecture, but an immersive and interactive learning experience.
This is an ideal course for security analysts, malware analysts/researchers and blue teams that need to get hands-on diving deep into malicious software.
$3,299.00 Original price was: $3,299.00.$2,299.00Current price is: $2,299.00.
Obfuscation, packing and other forms of anti-analysis are often used by malware authors to disrupt or even prevent detailed analysis. This helps the threat actors to avoid detection by even the most advanced security products deployed in your enterprise.
The skills covered in this training will ultimately allow you to generate valuable threat intelligence to aid in your efforts to defend your organization or respond to an incident.
This is a fast-paced course designed to take you deep into malware reverse engineering! Each day will end with comprehensive analysis activities and exercises to test and reaffirm key learning objectives. This course is designed to not just simply be 2 days of lecture, but an immersive and interactive learning experience. This is an ideal course for security analysts, malware analysts/researchers and blue teams that need to get hands-on diving deep into malicious software.
Students will be provided with all of the lab material used throughout the course in a digital format. This includes all lab material, lab guides and virtual machines used for training. This course will also utilize several live classroom sharing resources, such as chat and notes to ensure that students have access to all material discussed throughout the training. Comprehensive lab guides will also be provided to ensure that students have the ability to continue learning after the course ends and maximize the knowledge gained from this course.
• Identifying signs of packing and obfuscation in native code formats (PE files) • Developing strategies for detecting known and custom packers • Unpacking malware using reversing tools and debuggers • Identifying anti-analysis techniques and developing mitigations • Process hollowing and other code injection techniques
• Malware use of shellcode – extracting and analyzing • Digging deep into the PE file format • Dynamically constructing import tables and other methods for calling Windows APIs • Identifying string obfuscation through hashes, encryption and other techniques • Dissecting modular malware such as TrickBot • Identifying malware C2 patterns