NetSecurity NetSecurity Forensic Labs Hands-On How-To Security Training
Training Courses On-Site Training Registration Forensic Labs Company
Network &asp; Application Security, Computer Forensics, Incident Response, Network Forensics, Malware Analysis, Memory Forensics, Malicious Document Analysis
Hands-On How-To® Training > Courses >
Malware Analysis Training

Syllabus: Detailed syllabus is available.

Real-World Scenario (Course Overview):

You are the leader of an incident response team charged with conducting high-profile cyber crime investigations for a major government agency with 182,522 nodes. This organization is hit with millions of hacking attempts daily. The enterprise network has been under attack for the past two weeks and members of your team have been working around-the-clock to contain the incident. After many man-hours, the network seemed calm and the attack appeared to be thwarted; or so you thought. Exactly one week later, a member of the Tier II team observes that attackers have successfully penetrated valuable systems and are pilfering crucial government data to a foreign country. Some of the malicious software (malware) has been captured, but you have limited expertise to answer critical questions about the compromise. Senior agency's officials are demanding immediate answers as to how the malware got into the network, where it originated from, what critical data was compromised, who created the malware, and how the agency can defend against this type of attack in the future. Do you have the requisite skills to provide quick and accurate answers to the above high profile penetration and mitigate future attempts?

Today's cyber adversaries are highly skilled and sophisticated hackers who are either part of state-sponsored or organized crime. These elite hackers are so advanced that current security measures do not detect, let alone prevent their attacks. These criminals are paid and spend ample time conducting reconnaissance about their targets, then customizing their attack towards the victim. The firewall doesn't prevent the attack and the IDS doesn't detect these intrusions. These cyber criminals continue to leverage users' susceptibility to social engineering attacks to infiltrate critical networks. Once inside the network, they lay low on the radar and often go undetected since there are no known signatures.

Malware Analysis is a time-consuming effort that requires specialized expertise, procedures, tools, and real-world analysis skills. NetSecurity's Hands-On How-To® Malware Analysis course teaches students the step-by-step process for quickly analyzing malware to determine the extent of their malicious intent and device appropriate countermeasures. The Hands-On How-To® Lab Exercises (HOHTLEs) covered in the course incorporate significant real-world experience necessary for delivering legally admissible world-class results in the field.

NetSecurity Benefits:

Through years of real-world hands-on cyber security, digital forensics, and incident response experience, NetSecurity has supported Fortune 500 companies and federal agencies such as the IRS, DHS, VA, BBG, DOL, NSF, and DoD. The benefits of our Hands-On How-To® Malware Analysis course include:

  • Skills to establish and fortify an organization's security, forensics, and incident response capabilities
  • Customized private sessions, tailored towards organizations' unique environments
  • Detailed step-by-step and how-to instructions
  • Instructor-led and student-performed hands-on exercises
  • Real-world simulations of malicious software in a lab environment
  • Seasoned expert instructors with real-world hands-on consulting and training experience
  • Arsenal of take-aways (tools, templates, guides, and relevant forensics resources)
  • Up-to-date course content, addressing emerging malware analysis challenges
  • Small class sizes ensuring maximum student-instructor interaction
  • Vendor-neutral content, covering commercial and freeware tools

Target Audience:

The Malware Analysis course is targeted towards technical professionals, including:

  • Computer Forensics Investigators
  • Incident Responders
  • Malware Analysts
  • Information Security Professionals
  • Technology Enthusiasts

Course Format:

  • Interactive presentations by security, forensics, and incident response expert instructor
  • Hands-On How-To® Lab Exercises performing computer forensics and incident response

Course Duration: Three (3) Days

Course Cost: CALL

Course Objectives:

Upon successful completion of the Hands-On How-To® Malware Analysis course, each participant will be armed with the knowledge, tools, and processes required in conducting malware analysis and producing a report that can withstand legal scrutiny. Specifically, students will possess relevant knowledge and real-world hands-on skills in:

  • Introduction to Malware Analysis
  • Malware Hiding Places
  • Building a Malware Analysis Lab (Environment)
  • Static Analysis
  • Dynamic Analysis
  • Code Analysis
  • Malicious Document Analysis
  • Identifying and Protecting against Malware
  • Malware Challenges in the Real-World

Course Topics:

NetSecurity’s Malware Analysis course includes in-depth coverage of real-world scenarios and HOHTLEs in the following areas:

Topics Discussion and HOHTLEs
  • Introduction to Malware Analysis
  • Malware Taxonomy
  • Malware Threats
  • Malware Analysis Methodologies
  • Legal Considerations
  • Identifying and Protecting against Malware
  • Malware Hiding Places
  • Collecting Malware from Live system
  • Identifying Malware in Dead system
  • Building a Malware Analysis Lab (Environment)
  • Virtual Machine
  • Real Systems
  • Malware Analysis Tools
  • Static Analysis
  • Detailed File Analysis
  • Database of File Hashes
  • Identifying File Compile Date
  • Identifying Packing/Obfuscation Methods
  • Performing Strings
  • File Signature Analysis
  • Local and Online Malware Scanning
  • Identifying File Dependencies
  • Dynamic Analysis
  • System Baselining
  • Host Integrity Monitor
  • Installation Monitor
  • Process Monitor
  • File Monitor
  • Registry Analysis/Monitoring
  • Network Traffic Monitoring/Analysis
  • Port Monitor
  • DNS Monitoring/Resolution
  • Simulating Internet Services
  • Code Analysis
  • Reverse Engineering Malicious Code
  • Identifying Malware Passwords
  • Bypassing Authentication
  • Malicious Document Analysis
  • PDF and Microsoft Office Document Structures
  • PDF and Office Documents Vulnerabilities
  • Malware Extraction and Analysis Tools
  • Analysis of Malicious Documents
  • Malware Challenges
  • Virtual Environment
  • Live Internet Connection
  • Real, Fake, and Virtual Services
  • Anti-Debug and Anti-forensic Malware       

Detailed syllabus is available.

Course Schedule and Registration:

Course schedule and registration information is available here.

 

HANDS-ON HOW-T FORENSICS COURSES

 

HANDS-ON HOWT SECURITY COURSES

 

HANDS-ON HOW-T GENERAL COURSES

 

certification training