Respond faster to threats from the latest malware
Malware Analysis Training
In the current state where malware is constantly being modified to bypass all sorts of modern endpoint controls, the skills taught in this course are becoming increasingly critical for organizations to properly defend themselves.
Students will learn advanced malware analysis techniques that will teach them to examine and understand real-world malicious Windows programs in this course. They will also learn how to start using threat intelligence within the enterprise.
Why Advanced Malware Analysis Training?
Learn how to assess damage
Discover the main indicators of a compromised machine
Determine the intruder’s sophistication level
Learn how to identify vulnerabilities
Learn how to capture the attacker
We dive deeper than theory based knowledge to teach practical skills in malware analysis area
Our training can be fully customized to cater
for various needs in companies & institutions
Real Malware Samples
Analyze real malware samples found recently in the wild, analyzed by our professional researchers
Red Alert’s Analysis Report
Training also provides detailed malware analysis
report made by NSHC’s professional researchers
Who should take this training?
Digital Forensic Incident Responder
|Cyber Threats||Learn about the different kinds of threats and malware in the wild|
|Malware Techniques||Combat and bypass anti-analysis techniques used by malware authors such as.|
Anti-Debugging | Anti-disassembly | Anti-Virtual Machine | Etc
|Analysis Detection||Checking logs, registry and memory|
|Memory Analysis||Find and investigate malicious code in memory for incident response|
|Automated Analysis Lab||Set up a sandbox and malware analysis lab to speed up you investigation|
|Dynamic Malware Analysis||Debug and analyze malicious software in order to observe malware behavior|
|Static Malware Analysis||Decompile malicious software to understand the entire process flow of malware|
|Yara||Identity and classify malware using complex pattern matching|
|Cyber Threat Intelligence||Introduce threat intelligence on top of business, SOC, and IR programs|