Advanced Malware Hunting - AMH

Beschreibung

This course teaches the ways of identifying how malware looks like, what malicious activities you shouldlook out for and the ways of removing it. You will also learn how to implement and manage preventivesolutions both for small and medium sized for enterprises and organizations. During this course you learnwhat makes piece of code malicious, go through historic examples and get familiar with different kinds of malwareand how to identify various cases. Oncewe have sufficient understanding of techniques and capabilities of malware, we willstart system and network hardening-youwill implement security in depth solutions, such as whitelisting or virtualization, in order to protect assets.

error_outline Wichtige Information

Dieses Seminar wird in ENGLISCH gehalten!

expand_more chevron_right Zielgruppe

Ideal candidate for this course:
  • Enterprise administrators
  • infrastructure architects
  • security professionals
  • systems engineers
  • network administrators
  • IT professionals
  • security consultants
  • other people responsible for implementing network and perimeter security

    expand_more chevron_right Vorkenntnisse

    The following knowledge is recommended for this seminar:
    • a good hands-on experience in administering Windows infrastructure
    • at least 5-8 years in the field is recommended

    expand_more chevron_right Detail-Inhalte

    What is Malware
    • Malware History
    • Malware Goals
    • Types of Malware
    • Advanced Persistent Threats
    • Indicators of Compromise

    Introduction to Malware Analysis
    • Types of malware analysis
    • Goals of malware analysis
    • Impact analysis
    • Containment and mitigation
    • Incident prevention and response playbooks
    • Setting up sandbox environment
    • Cloud-based malware analysis

    Static Malware Analysis
    • Executable analysis
    • Extracting secrets
    • Determining if file is packed or obfuscated
    • Fingerprinting the malware
    • Pattern matching using YARA

    Behavioral Malware Analysis
    • Malware detonation
    • Sysinternals suite
    • Network communication analysis
    • Monitoring system events
    • Memory dump analysis
    • Simulating real environment

    Malicious non-exe files
    • Alternative binaries
    • PowerShell scripts
    • Office documents
    • JScripte
    • HTML documents
    • Living off the land binaries

    Advanced Techniques used by Malware
    • Malware persistence methods
    • Malware stealth techniques
    • Covert channel communication
    • Domain Generator Algorithms
    • Anti-VM and Anti-debugging tricks

    Defending against Malware
    • Windows security solutions
    • Anti-Virus software
    • EDR software
    • Principle of least privilege
    • Application Whitelisting
    • Virtualization
    • Network and domain segmentation
    • expand_more chevron_right event_available 13.12.-17.12.2021 13.12.2021 verified_user Termingarantie Seminarzeitentimer5 Tage roomVirtual-Training (VILT)
      • expand_more chevron_right Virtual Classroom 3.250,00
        • Ihr vILT Seminar (virtual Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • keine Anfahrt ins Seminarzentrum notwendig
    • expand_more chevron_right event_available 06.06.-10.06.2022 06.06.2022 Seminarzeitentimer5 Tage roomVirtual-Training (VILT)
      • expand_more chevron_right Virtual Classroom 3.500,00
        • Ihr vILT Seminar (virtual Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • keine Anfahrt ins Seminarzentrum notwendig

    Ähnliche Seminare