Malware Analysis

Catalog Home Java/Java EE, Open-Source & Web Application Servers Java Application Security

Viruses, Trojans, Ransomware, Adware, Worms, Spybots, Rootkits, and Botnets: These are just a fraction of the threats that may be spying on someone’s activities, stealing their information, their resources, or their money—maybe even carrying out illegal activities on some victims behalf; the worst part is that all of this could be happening without a user even being aware.
Advanced Malware is out there, deploying military grade cyber-security patterns, as well as applying impressive hiding, infecting, and mutating techniques, which may target an organization or an individual’s personal device at all times. The danger is everywhere, and it is real. Luckily, there are means to mitigate, and respond.

In this intensive hands-on course, you will learn to analyze, detect, and apply anti-malware solutions by learning the patterns of thought, and techniques of an attacker.
While the course is mostly targeting modern Windows and Linux malware and techniques, with some focus on iOS and Android, the course can be customized to focus on any of the leading desktops, servers, or mobile operating systems. While the course is mostly focused on the X86 architecture sets, In depth ARM discussion can be presented per the client’s requirement.

• To take this course, you must have basic knowledge in C and X86 (or ARM) architecture • Python experience is recommended, but is not required • Experience with software development and debugging, or Network Administration is highly recommended

4 Days/Lecture & Lab

Security personnel at all levels, who has practical software development experience.

Introduction to Malware Types and Damage

  • Binary Exploitation Overview
  • Exploit Piggy-backing on Higher Level Technologies
  • The Mobile Malware Landscape
  • Attacker’s View I: Malware construction
  • Defender’s View I: Classification and Analysis
  • Attacker’s View II: Advanced attacking and hiding techniques
  • Defender’s View II: Advanced defending techniques




< >

Recently Viewed Courses:

Copyright © 2018 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media