Home Specialist skills Security FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
-
Learn to build an isolated, controlled laboratory environment for analysing the code and behaviour of malicious programs
-
Know how to employ network and system-monitoring tools to examine how malware interacts with the file system, registry, network and other processes in a Windows environment
-
Understand how to uncover and analyse malicious JavaScript and other components of web pages, which are often used by exploit kits for drive-by attacks
-
Learn how to bypass a variety of packers and other defensive mechanisms designed by malware authors to misdirect, confuse and otherwise slow down the analyst
-
Recognise and understand common assembly-level patterns in malicious code, such as code L injection, API hooking and anti-analysis measures
Overview
Off the shelf (OTS)
Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers and IT administrators acquire the practical skills to examine malicious programs that target and infect Windows systems.
Delivery method
Face to face
Virtual
Digital
Course duration
45-48 hours
Competency level
Expert
Delivery method
-
Face to face
-
Virtual
-
Digital
Course duration
45-48 hours
Competency level
-
Expert