Live On-Site / Live Virtual
Gain essential skills to detect, investigate, and respond to sophisticated malware attacks. This hands-on course covers static, dynamic, code, and memory analysis, with practical labs on real-world malware samples. Learn advanced techniques to uncover adversaries’ tactics and integrate analysis into automated systems.
Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics, and incident response. With adversaries getting sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations, it is essential for cyber-security professionals to have the necessary skills to detect, respond and investigate such intrusions. Malware analysis and memory Forensics have become a must-have skill for fighting advanced malwares, targeted attacks, and security breaches. This hands-on training teaches the concepts, tools, and techniques to analyze, investigate, and hunt malwares by combining two powerful techniques malware analysis and memory forensics. After taking this course, attendees will be better equipped with the skills to analyze, investigate, and respond to malware-related incidents.
This course will introduce attendees to the basics of malware analysis, reverse engineering, Windows internals, and memory forensics and then it gradually progresses deep into more advanced concepts of malware analysis & memory forensics. Attendees will learn to perform static, dynamic, code, and memory analysis. To keep the training completely practical, it consists of various scenario-based hands-on labs after each module which involves analyzing real-world malware samples and investigating malware infected memory images (crimewares, APT malwares, Fileless malwares, Rootkits, etc). This hands-on training is designed to help attendees gain a better understanding of the subject in a short span of time. Throughout the course, the attendees will learn the latest techniques used by the adversaries to compromise and persist on the system. In addition to that, it also covers various code injection, hooking, and rootkit techniques used by adversaries to bypass forensic tools and security products. In this training, you will also gain an understanding of how to integrate malware analysis and memory forensics techniques into a custom sandbox to automate the analysis of malicious code.
On attending this course, you will get:
3 Days
This course is intended for
Note: VMware Player or VirtualBox is not suitable for this training. The lab setup guide will be sent to you after registration.
Need a Template to Justify the Training Request to your Manager? Download the Template below
Handson lab exercise(scenariobased) involves investigating malware infected memory
Demo – Hunting an APT malware from Memory
To successfully participate in this course, attendees should possess the following:
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.
GET IN TOUCH FOR PRICING
GET IN TOUCH FOR PRICING
Our Live Virtual and On-Site sessions replicate the interactive classroom experience, fostering real-time collaboration and engagement among participants.
No, the training that you purchase from 8kSec, including the course materials is exclusively for your individual use. You may not reproduce, distribute or display (post/upload) lecture notes, or recordings, or course materials in any other way — whether or not a fee is charged – without the express written consent of 8kSec.
For On-Site/Virtual Courses during private trainings/conferences, we provide a customized certificate after the completion of the course. Please note that the Certificate of Course Completion is different from the one obtained after clearning the Certification exam.
For Virtual/Live Trainings, we will provide you access to our Lab environment and an instruction guide during the training.
You can find our Training Schedule at https://8ksec.io/public-training/. To schedule a Live Virtual or Live On-site private training for a group of 5+ attendees, email trainings@8ksec.io and our logistics team will get in touch with you to organize one.
The information on this page is subject to change without notice.
Please share with us the project requirements and the goals you want to achieve, and one of our sales representatives will contact you within one business day.
51 Pleasant St # 843, Malden, MA, Middlesex, US, 02148
contact@8ksec.io
trainings@8ksec.io
press@8ksec.io
+1(347)-4772-006
Get the latest news & updates
© 2024 8kSec LLC All Right Reserved