Malware Analysis 4-Day Course
While intermediate topics and course material will be discussed, this course is wholly designed for students interested in Basic Malware Analysis Techniques. Lunarline’s 3-day hands on course will provide students demos and lessons on basic/static analysis methodologies, conducting open source research online and real-life examples of malware capabilities and characteristics. Students will have guided instruction and practice handling and collecting malware samples, responding to infected systems, and extended practice using current malware analysis tools and methods. Each lab builds upon the next allowing for guided instruction.
What you learn:
- Malware Classification
- Target Types
- Infection Phases
- Methods of Infection
- Common Malware Behavior
- Malware Removal Techniques
- The 4 Main Analysis Techniques
- Common System and Networking Tools
- Debugging / De-obfuscation
- Overview of Windows System Internals (DLL’s, Kernel Hooks, and etc.)
- Reverse-engineering Concepts
- Volatile Data Collection
- Non-volatile Data Collection
- Examining Indicators of a Malware Infection/File Profiling
- Memory Analysis
- Network Packet Analysis/File & Object Carving From Network Traffic
- Online File Analysis/Reputation Sites
- Malware Sample Sites
- IP/Domain lookups
- Overview of capabilities
- Understanding PCAP files
- Wireshark filtering
- Tips and tricks
Course includes the following takeaway items:
- A student instruction book; selected movie clips, and handouts of relevant articles.
- A CD with tools and other useful reference items introduced in the course.
- Access to the learning portal where students will be able to download the current and latest tools available on the internet after completing the course.
NICE Work Roles
Cyber Defense Forensics Analyst
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
- Module 1 - Introduction
- Module 2 – Administrivia (Course Overview, Bathrooms, Breaks) Instructor and Student Introductions
- Module 3 – Malware Analysis Methodology
- Module 4 – How to Conduct Open Source Research
- Module 5 – How to Identify Malware
- Module 6 - Determining the Threat Level of Malware
- Module 7 - Capabilities and Characteristics of Malware
Need more information on this course?
“It has been a great experience learning RMF by the way of the instructor, Ashely Roan who was very knowledgeable in the field. Thank you for making the course enjoyable, relatable and memorable!”
“Instruction was first rate. Lunarline worked with my organization in a flexible manner allowing me to obtain the training as required. I enjoyed the instructor- knowledgeable, personable, professional, entertaining and impressive.”
“Excellent learning experience. Many classes taken over my career, this class offered a “real” world approach to a new methodology. Easy to follow, repetitious in the right areas. Excellent coverage of material at appropriate pace. Real world example were good!”
“The class was excellent! I will continue to take classes from Lunarline in the future. The course material being loaded on a tablet was also a great idea because this will be a great resource to have in my future meetings.”
“I feel prepared to transition to RMF based on the content covered by the course. The hands‐on demo was very helpful and very relevant to my job.”