Malware is a growing threat to the information and intellectual property of organizations as techniques from attackers become increasingly sophisticated. This course will provide a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact. Discussions and hands-on exercises will demonstrate malware analysis processes and their complexities as well as illustrate how to appropriately size, design, and build an analytical capability best suited for your organization. Participants will prepare an analysis test-bed and analyze multiple malware samples. Think like a Black Hat, exploring advanced techniques and tools, including data exfiltration and stealthy operation, to understand the tactics of malware authors.
Who Should Attend
Information assurance officers (IAOs) and managers (IAMs), information security professionals charged with threat detection and incident response, and IT professionals seeking a greater understanding of potential malware threats and exploitation techniques
How You Will Benefit
- Develop foundational knowledge of malicious software, its forms, traits, author motivations, and impacts.
- Identify, discuss, and practice sound malware analysis processes
- Conduct your own analysis on multiple malware samples using state-of-the-art tools.
- Determine how to build an analytical capability to fit your organization, considering resource limitation and best practices.
- Discover Black Hat exploitation techniques and why they are difficult to detect – think like a malware author to better anticipate their actions.
- Malware Overview; Creating an Analysis Environment
- Static Analysis
- Dynamic Analysis
- Malware Analysis Lab