Course Summary

This training equips forensic investigators, incident responders, security engineers, and threat analysts with the practical skills needed to analyze malicious programs targeting and infecting Windows systems.

A solid understanding of malware is crucial for gathering threat intelligence, responding effectively to cybersecurity incidents, and enhancing enterprise security. This course lays a strong foundation in reverse-engineering malicious software by using various system and network monitoring tools, a disassembler, a debugger, and other freely available utilities.

Key areas covered include:

Malware analysis through code and behavioral analysis fundamentals
Understanding Windows assembly code for reverse engineering and identifying common malware traits in assembly
In-depth analysis of malicious executables and self-defending malware
Examination of malicious document files, .NET programs, and protected executables

Analyzing Malicious Office Macros
The candidate will be able to analyze macros and scripts embedded in suspicious Microsoft Office files to assess their capabilities and potential threats.

Analyzing Malicious PDFs
The candidate will be able to examine suspicious PDFs and any embedded scripts to understand the nature of the threat they may present.

Analyzing Malicious RTF Files
The candidate will be able to evaluate suspicious RTF files and embedded shellcode to determine their malicious capabilities.

Analyzing Obfuscated Malware
The candidate will be able to identify packed Windows executables and obfuscated malicious JavaScript, and unpack them to gain insight into their key functions.

Behavioral Analysis Fundamentals
The candidate will be able to analyze the static properties of a suspected malware sample, develop hypotheses regarding its behavior, and determine appropriate next steps for analysis.

Common Malware Patterns
The candidate will be able to identify common API calls used by malware and understand the capabilities these APIs provide to malware. The candidate will also recognize common techniques used by malware, including code injection, hooking, and process hollowing.

Core Reverse Engineering Concepts
The candidate will apply dynamic analysis techniques using a debugger to examine malware samples and will use static analysis to interpret common assembly instructions and patterns found in Windows malware through a disassembler.

Examining .NET Malware
The candidate will be able to analyze .NET-based malware to understand its functionality and behavior.

Identifying and Bypassing Anti-Analysis Techniques
The candidate will be able to identify common debugger detection mechanisms and data protection techniques used by malware, as well as strategies to bypass security tool detection.

Malware Analysis Fundamentals
The candidate will be able to explain the key methods for analyzing malicious software and identify the necessary tools and environment for conducting malware analysis.

Malware Flow Control and Structures
The candidate will be able to analyze common control flow mechanisms, such as loops and conditionals, in assembly language to understand malware execution paths.

Overcoming Misdirection Techniques
The candidate will be able to identify and overcome misdirection techniques used by malware to disrupt analysis, such as altering execution workflows.

Reversing Functions in Assembly
The candidate will be able to analyze malware functions in assembly language to understand how parameters are used, how return values are handled, and how other structural elements are implemented.

Static Analysis Fundamentals
The candidate will be able to analyze the static properties of a suspected malware sample, form hypotheses about its nature, and determine the next steps for deeper analysis.

Unpacking and Debugging Packed Malware
The candidate will demonstrate the process of unpacking packed malware using a debugger and repairing the unpacked version for further detailed analysis.

There are currently no prerequisites for this course.

proctored exam 66-75 questions 2-3 hours Minimum passing score of 73%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?