Advanced Malware Hunting & Prevention (AMH)

Seminarinhalt

This course teaches the ways of identifying how malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium sized for enterprises and organizations. During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening-you will implement security in depth solutions, such as white listing or virtualization, in order to protect assets.

.... Zur Videobeschreibung

Programm

What is Malware
  • Malware History
  • Malware Goals
  • Types of Malware
  • Advanced Persistent Threats
  • Indicators of Compromise

Introduction to Malware Analysis
  • Types of malware analysis
  • Goals of malware analysis
  • Impact analysis
  • Containment and mitigation
  • Incident prevention and response playbooks
  • Setting up sandbox environment
  • Cloud-based malware analysis

Static Malware Analysis
  • Executable analysis
  • Extracting secrets
  • Determining if file is packed or obfuscated
  • Fingerprinting the malware
  • Pattern matching using YARA

Behavioral Malware Analysis
  • Malware detonation
  • Sysinternals suite
  • Network communication analysis
  • Monitoring system events
  • Memory dump analysis
  • Simulating real environment

Malicious non-exe files
  • Alternative binaries
  • PowerShell scripts
  • Office documents
  • JScripte
  • HTML documents
  • Living off the land binaries

Advanced Techniques used by Malware
  • Malware persistence methods
  • Malware stealth techniques
  • Covert channel communication
  • Domain Generator Algorithms
  • Anti-VM and Anti-debugging tricks

Defending against Malware
  • Windows security solutions
  • Anti-Virus software
  • EDR software
  • Principle of least privilege
  • Application Whitelisting
  • Virtualization
  • Network and domain segmentation

Zielgruppen

  • Enterprise administrators
  • infrastructure architects
  • security professionals
  • systems engineers
  • network administrators
  • IT professionals
  • security consultants
  • other people responsible for implementing network and perimeter security

Vorkenntnisse

  • a good hands-on experience in administering Windows infrastructure
  • at least 5-8 years in the field is recommended

Wichtige Information

Dieses Training wird in ENGLISCH gehalten!

Downloads

5 Tage ab  3.780,-
Termin wählen
Trainings-ID:
AMH

Jetzt buchen

  • 27.10.-31.10.2025 27.10.2025 5 Tage 5T ab  3.780,-

      Trainingspreis

       3.780,-
    • Trainingspreis Online  3.780,-

Sie haben Fragen?

Ihr ETC Support

Kontaktieren Sie uns!

+43 1 533 1777-99

This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form

Unsere Empfehlungen für Sie

Was ist die ETC-Wissensgarantie?

Sie möchten Ihr Seminar noch einmal besuchen? Die ETC-Wissensgarantie macht es möglich! Ob im Krankheitsfall, bei Planänderung im Unternehmen oder um Ihr Trainings-Knowhow aufzufrischen: Besuchen Sie dazu Ihr Training innerhalb von bis zu 12 Monaten nochmals kostenlos! Ohne Stornokosten oder sonstiger Zusatzstress.

Weitere Infos

Lernformen im Überblick

Mehr darüber