Course Description
Training Delivery Details
Instructor Led Training
Live Training: Five Days (5 hours / Day) | Certification of Attendance
The course material includes full access to our
Malware Analysis - On-Demand Course
Sessions starts from 9 AM to 2 PM (Eastern Time) or scheduled upon a mutual agreement
Pricing Options
Please make sure you select the enrollment schedule that works best for you. If none of these work and you are still interested in our training, please contact us.
-
C5W MALWARE ANALYSIS - VIRTUAL LIVE TRAINING
TBD, 2024
$1,750.00
Buy Now
Syllabus
After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.
2. Working with a Sandbox and Different Analysis Tools
3. PE File Analysis
4. Assembly x86/x64 Crash Course
5. Reverse Engineer and Debugging Malware
6. Analyzing Different Injection Techniques
7. Malware Persistence Mechanisms
8. Obfuscation and Anti-Analysis Techniques
9. Analyzing Malware Armed with Shellcode
10. Analyzing Managed Code (readable/uncompiled)
11. Extracting IOCs and writing YARA Rules
12. Writing Reports
Instructor
Cyber 5W Team
Learning Objectives
After completing this course, the student will be able to perform the following:
-
Ability to Analyze Malware using Different Tools and Sandboxes
-
Learn assembly x86/x64
-
Learn how to reverse engineer and debug malware
-
Ability to analyze malware with different injection techniques
-
Learn about malware persistence, obfuscation, and anti-analysis techniques
-
Learn how to locate and analyze malware using shellcode
-
Ability to analyze malware written using managed languages, such as: .NET, HTA, VBScript, Python, and JavaScript
-
Ability to extract IOCs from malware samples and turn them into YARA rules
-
Learn how to write malware analysis reports
Prerequisites
This course assumes no previous knowledge in malware analysis. However, basic knowledge in computer science, operating systems, programming, assembly, or any related field is highly desirable.
Important: Learners must have experience installing software and running virtual machines within a hypervisor. Please ensure you are comfortable setting up and managing virtual machines independently.
The Value of the Training
Who is this Training For?
System Requirements:
what you need to for the course
2. Capability of running virtualization software (VMWare or VirtualBox) and the attendee is comfortable of running malware on it.
3. More than 50 GB of disk space for the VMs used.
Cancellation Policy:
Info you need to know to get a refund