A malware analyst works in the field of computer and network security to examine, identify, and understand the nature of cyber-threats such as viruses, worms, bots, rootkits, and Trojan horses. All of these types of programs represent malicious code that can infect systems and cause them to behave in unexpected ways. Malware can compromise both the hardware and software integrity of a computer or network as well as steal proprietary data such as a company's financial records. Because malicious code comes in many different forms, a malware analyst must be thoroughly conversant with both interpreted and compiled programming languages and must possess a keen understanding of both reverse-engineering and software development.
The course begins by establishing the foundation for analyzing malware in a way that dramatically expands upon the findings of automated analysis tools. You will learn how to set up a flexible laboratory to examine the inner workings of malicious software, and how to use the lab to uncover characteristics of real-world malware samples. You will also learn how to redirect and intercept network traffic in the lab to explore the specimen's capabilities by interacting with the malicious program.
- Build an isolated, controlled laboratory environment for analyzing the code and behavior of malicious programs
- Employ network and system-monitoring tools to examine how malware interacts with the file system, registry, network, and other processes in a Windows environment
- Control relevant aspects of the malicious program's behavior through network traffic interception and code patching to perform effective malware analysis
- Use a disassembler and a debugger to examine the inner workings of malicious Windows executables
- Bypass a variety of packers and other defensive mechanisms designed by malware authors to misdirect, confuse, and otherwise slow down the analyst
- Recognize and understand common assembly-level patterns in malicious code, such as code L injection, API hooking, and anti-analysis measures
- Assess the threat associated with malicious documents, such as PDF and Microsoft Office files
- Derive Indicators of Compromise (IOCs) from malicious executables to strengthen incident response and threat intelligence efforts..
- Lectures 1
- Timing 11am-1pm
- Hours 2-3hours
- Skill level Basics
- Language English,hindi
- Students 15000+
- Assessments Yes
Global Institute Of Inforamyion Security
I am really happy with your service, it is exceptional, Web Design Enterprise is just great. When I have a question they answer it at once, they have more than an outstanding customer service. After having a bad experience with my old Web Designer Company, I would say that Web Design Enterprise people are very professional and their knowledge is incredible, they also solve problems very fast, I am impressed. I recommend Web Design Enterprise to all my customers, friends and clients.