Course Summary

FOR610 training has helped forensic investigators, incident responders, security engineers, and threat analysts acquire the practical skills to examine malicious programs that target and infect Windows systems.

Understanding the capabilities of malware is critical to your ability to derive threat intelligence, respond to cybersecurity incidents, and fortify enterprise defenses. This course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and many other freely available tools.

Malware Analysis Using Malware Code and Behavioral Analysis Fundamentals
Windows Assembly Code Concepts for Reverse Engineering and Common Windows Malware Characteristics in Assembly
In-Depth Analysis of Malicious Executables and Self-Defending Malware
Analysis of Malicious Document Files, .NET programs, and Protected Executables

Analyzing Malicious Office Macros
The candidate will be able to analyze macros and scripts embedded in suspicious Microsoft Office files to understand their capabilities.
Analyzing Malicious PDFs
The candidate will be able to analyze suspicious PDFs and embedded scripts to understand the nature of the threat they might pose.
Analyzing Malicious RTF Files
The candidate will be able to analyze suspicious RTF files and embedded shellcode to understand their capabilities.
Analyzing Obfuscated Malware
The candidate will be able to identify packed Windows executables and obfuscated malicious JavaScript and unpack it to gain visibility of it’s key capabilities.
Behavioral Analysis Fundamentals
The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
Common Malware Patterns
The candidate will be able to identify common API calls used by malware and understand what capabilities the APIs offer to the malware samples. The candidate will be able to identify common techniques used by malware including code injection, hooking, and process hollowing techniques.
Core Reverse Engineering Concepts
The candidate will apply dynamic analysis techniques to examine a malware sample in a debugger and will apply static analysis techniques to interpret common assembly instructions and patterns in Windows malware using a disassembler.
Examining .NET Malware
The candidate will be able to analyze .NET programs to understand their capabilities.
Identifying and Bypassing Anti-Analysis Techniques
The candidate will be able to identify and bypass common debugger detection and data protection measures used in malware, including the detection of security tools.
Malware Analysis Fundamentals
The candidate will be able to describe key methods for analyzing malicious software and identify the needs of malware analysis lab.
Malware Flow Control and Structures
The candidate will be able to analyze common execution flow control mechanisms, such as loops and conditional statements, in assembly language.
Overcoming Misdirection Techniques
The candidate will be able to overcome misdirecting execution workflow as an anti-analysis technique used in malware.
Reversing Functions in Assembly
The candidate will be able to analyze malware functions in assembly language to understand use of parameters, return values and other structural elements.
Static Analysis Fundamentals
The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
Unpacking and Debugging Packed Malware
The candidate will demonstrate process for unpacking malware using a debugger and repairing unpacked malware for further analysis.

There are currently no prerequisites for this course.

proctored exam 66-75 questions 2-3 hours Minimum passing score of 73%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?