Masterclass: Advanced Malware Hunting
- Kursuskode AMH
- Varighed 5 dage
Leveringsmetoder
Go to:
Leveringsmetoder
Kurset er tilgængeligt i følgende formater:
-
Firma kursus
Et lukket firma kursus
-
Åbent kursus
Traditionel klasserumsundervisning
-
Åbent kursus (Virtuelt)
Live klasserumsundervisning du tilgår virtuelt
Anmod om dette kursus Med en anden leveringsløsning
Beskrivelse
ToppenKursusdato
ToppenMålgruppe
ToppenEnterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5-8 years in the field is recommended.
Kursusindhold
ToppenModule 1: What is malware
a) Malware History
b) Malware Goals
c) Types of Malware
d) Advanced Persistent Threats
e) Indicators of Compromise
Module 2: Introduction to Malware Analysis
a) Types of malware analysis
b) Goals of malware analysis
c) Impact analysis
d) Containment and mitigation
e) Incident prevention and response playbooks
f) Setting up sandbox environment
g) Cloud-based malware analysis
Module 3: Static malware analysis
a) Executable analysis
b) Extracting secrets
c) Determining if file is packed or obfuscated
d) Fingerprinting the malware
e) Pattern matching using YARA
Module 4: Behavioral malware analysis
a) Malware detonation
b) Sysinternals suite
c) Network communication analysis
d) Monitoring system events
e) Memory dump analysis
f) Simulating real environment
Module 5: Malicious non-exe files
a) Alternative binaries
b) PowerShell scripts
c) Office documents
d) JScript
e) HTML documents
f) Living off the land binaries
Module 6: Advanced techniques used by malware
a) Malware persistence methods
b) Malware stealth techniques
c) Covert channel communication
d) Domain Generator Algorithms
e) Anti-VM and Anti-debugging tricks
Module 7: Defending against malware
a) Windows security solutions
b) Anti-Virus software
c) EDR software
d) Principle of least privilege
e) Application Whitelisting
f) Virtualization
g) Network and domain segmentation
Forudsætninger
Toppen- To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5-8 years in the field is recommended.
Certificeringstest
Toppen- After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible to claim CPE points!
Mere information
ToppenIntense exercises:
This course is packed with unique labs exercises! To get more practice we offer three extra weeks of labs online!After the training concludes, you may practice even more and repeat to consolidate newly gained skills and knowledge.
Platform and Technical Requirements:
To participate in the course you need a Stable internet connection. For the best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.