Masterclass: Advanced Malware Hunting [AMH]
This course teaches the ways of identifying how malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium-sized enterprises and organizations.
AMH
Target audience
Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
Prerecuisites
Content
- Malware History
- Malware Goals
- Types of Malware
- Advanced Persistent Threats
- Indicators of Compromise
- Module 2: Introduction to Malware Analysis
- Types of malware analysis
- Goals of malware analysis
- Impact analysis
- Containment and mitigation
- Incident prevention and response playbooks
- Setting up sandbox environment
- Cloud-based malware analysis
- Executable analysis
- Extracting secrets
- Determining if file is packed or obfuscated
- Fingerprinting the malware
- Pattern matching using YARA
- Malware detonation
- Sysinternals suite
- Network communication
- Alternative binaries
- PowerShell scripts
- Office documents
- JScript
- HTML documents
- Living off the land binaries
- Malware persistence methods
- Malware stealth techniques
- Covert channel communication
- Domain Generator Algorithms
- Anti-VM and Anti-debugging tricks
- Windows security solutions
- Anti-Virus software
- EDR software
- Principle of least privilege
- Application Whitelisting
- Virtualization
- Network and domain segmentation
Materials
Unique tools, over 150 pages of exercises and presentation slides with notes.
CPE Points (Continuing professional education)
Form
Virtual delivery with live trainer
Before you participate on a virtual course, we always try to arrange a 15 - 20 minute test session with the participants a week before to make sure that everyone is capable to attend the Masterclass. Below you will find the technical requirements for connecting to the virtual training:
- A computer with a stable internet connection (preferably Windows or Mac OS)
- Permissions for outgoing RDP connections to external servers (to our lab environment) – port 3389
- A headset (headphones + microphone)
- Webcam (built-in or plug-in)
- Additional monitor will be helpful but it’s not required
Instructor
Do you have any questions please contact
- Malene Kjærsgaard
- Konsulent
- +45 72202523