Malware Analysis and Reverse Engineering TrainingVendor: Advanced Security
Category: Cyber Security
What has become accepted as “reverse engineering training” is really just malware analysis that simply consists of “run-time analysis”. What this means is that you put the malware on a virtual machine and run a packet sniffer (like Wireshark), a registry monitor (like regshot), a file monitor (like filemon) and then a process monitor (like process explorer).
These common “reverse engineering” courses have you run malware and answer the questions:
1. Where is it connecting to?
2. Does it modify the registry?
3. Does it modify the file system?
4. Does it modify any running processes or start any new ones?
You don’t need a class to teach you these things. The goal of our malware analysis and reverse engineering training class is to provide a methodical hands-on approach to reverse-engineering by covering both behavioral and code analysis aspects of the analytical process.
Malware Analysis and Reverse Engineering Open Enrollment Classroom Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 80% Hands-On, 20% Lecture
Welcome to the most hands-on reverse engineering and malware analysis course available on the training market. In this certification training class you will analyze live malware collected from honeypots and forensics cases.
Pricing: $2,995 per enrollment
Malware Analysis / Reverse Engineering Live-Online Virtual Training Options
Would you be interested in taking this class as a live online course. Request info and let us know!
Custom Malware Analysis and Reverse Engineering Training For Your Organization
If your organization needs something other than what we have listed here, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
Malware Analysis / Reverse Engineering Training Schedule
All Times Listed in Eastern Standard Time (EST)
Date: 02/10/2014 - 02/14/2014
Days: Mon | Tues | Weds | Thurs | Fri
Time: 8:30am - 5:00pm
Our Malware Analysis and Reverse Engineering Training Topics
The course begins by looking into PE headers and how to handle DLL interactions. Then it moves on to the fundamentals of x86 architecture assembly. Next you learn to examine malicious code in order to understand the program’s key components and execution flow. You then learn to identify common malware characteristics by looking at Windows API use patterns, and will examine excerpts from bots, rootkits, key loggers, and downloaders. From there you move on to standard and custom packers and other tools and techniques for bypassing anti-virus, and then on to malware with anti-debugging/anti-analysis capabilities. Then the class is concluded with obfuscated browser scripts.
This course is the product of years of experience from top industry professionals who designed it after much time collecting the most relevant and outstanding types of materials that would ultimately create the superior malware certification training class.
This course is truly immersive into this expanding security / data threat realm so prepare to be blown away with the industry’s first REAL Reverse Engineering course worthy of its title.
Day 1: Dead Box Forensics
- Recovering Deleted Files
- Dealing with steganography
- Dealing with encryption
Day 2: Dynamic Analysis
- Building an analysis environment
- Identifying Malicious Activity
Day 3: Static Analysis
- Building a malware database archive
- Identifying malicious capability
Day 4: Network Traffic Analysis & Network IDS signature development
- PCAP Analysis
- IDS Signature Development
Day 5: Browser Forensics & Memory Analysis
- Mass Injection Analysis
- Charting malware redirection
- Carving executables out of RAM
Recommended Malware Analysis Training Audience & Prerequisites
Because of the very concise hands-on learning model, the advanced concepts and skills taught in this class are very attainable. Anyone from advanced hacking and forensic professionals to security managers. Even with a limited exposure to programming concepts or incident response. This is the beginning of a new era in malware reverse engineering training that enables anyone to obtain superior reverse engineering skills. It is recommended that you either have the Certified Ethical Hacker certification, similar experience or you have completed that course.