Certified Malware Analyst

Click Here to Fill the Enquiry Form

Course No: IS0073
With happening of hacking incidents, we can see different type of malware popping out in the market. These can vary in size, type, functionality and techniques. AV companies keep studying about this and try to identify the characteristics of these malwares.

Certified Malware Analyst program is focused to teach you everything about malware analysis. We teach you all this using case studies in our simulated virtual labs which makes you learn the things with hands on experience on real time malwares and there case studies.

This  course will be useful for almost computer engineers having basic knowledge of will anyway keep them aware with secure strategy irrespective of being in testing or in development. Specifically this program will be helpful to following genre of people:

  • Network/System Administrators
  • Penetration Testers
  • Networking Professionals
  • Aspirant Engineering Bachelors
We have some pre-requisite for this course. These are not mandatory but having them will certainly be a benefit for you.

  • Basic knowledge of OSI model, Operating System
  • Basic Ethical Hacking Course
Introduction To Malware Analysis

  • Malware Terminology.
  • Threats of Malwares.
  • Malware Analysis Methodologies.
  • Legal Considerations.
  •  Identification from Malware.
  • Protection from Malware.
  • Collecting Malware from Live Systems.
  • Identifying Malware in Dead systems.

Setting up a Malware Analysis Lab

  • Virtualization
  • Tools for Malware Analysis

Static Analysis

  • Detailed File Analysis.
  • Database of File Hashes.
  • Identifying File Compile Date.
  • Identifying Packing/Obfuscation Methods.
  • Performing Strings.
  • Designing a Security Policy.
  • File Signature Analysis.
  • Local and Online Malware Scaanning.
  • File Dependency Identification.
Dynamic Analysis

  • Host Integrity Monitor.
  • Baselining the System.
  • Installation Monitor.
  • Process Monitor.
  • File Monitor.
  • Registry Monitors.
  • Network Traffic Analysis.
  • Port Monitoring.
  • DNS Monitoring.
  • Simulation of Internet Services.

Analyzing the Code

  • Basics of Reverse Engineering.
  • Reverse Engineering Malicious Objects.
  • Extracting Malware Passwords.
  • Authentication Byepass.

Analyzing Malicious Documents

  • PDF and MS Office Document Structures.
  • PDF and MS Office Document Vulnerabilities.
  • Malware Extraction and Analysis Tools.
  • Malicous Documents analysis.

Beyond The Wall : The Challenging Part

  • Virtual Machines.
  • Distinguishing Real and Fake services.
  • Anti-Debugging Malwares.
  • Anti-Forensics Malwares.

DLP

$225

₹ 12,100
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Post
  • 3 Months Access
$ 225

₹ 12,100

Online

$175

₹ 9,500
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 3 Months Access
$ 175

₹ 9,500

Virtual Class

$300

₹ 16,200
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 30 Hours Virtual Class
$ 300

₹ 16,200

Have a query?

You got any doubt, question, suggestion in mind? Contact us.

One of our team member will get back to you asap.

Would like to tell the world about this course? Why not share it?

 

 

 

Course No: IS0073
Duration: 56 Hours (7 Days)

With happening of hacking incidents, we can see different type of malware popping out in the market. These can vary in size, type, functionality and techniques. AV companies keep studying about this and try to identify the characteristics of these malwares.

Certified Malware Analyst program is focused to teach you everything about malware analysis. We teach you all this using case studies in our simulated virtual labs which makes you learn the things with hands on experience on real time malwares and there case studies.

Course Modules:

Introduction To Malware Analysis

    • Malware Terminology.
    • Threats of Malwares.
    • Malware Analysis Methodologies.
    • Legal Considerations.
    •  Identification from Malware.
    • Protection from Malware.
    • Collecting Malware from Live Systems.
    • Identifying Malware in Dead systems.

Setting up a Malware Analysis Lab

    • Virtualization
    • Tools for Malware Analysis

Static Analysis

    • Detailed File Analysis.
    • Database of File Hashes.
    • Identifying File Compile Date.
    • Identifying Packing/Obfuscation Methods.
    • Performing Strings.
    • Designing a Security Policy.
    • File Signature Analysis.
    • Local and Online Malware Scaanning.
    • File Dependency Identification.

Dynamic Analysis

    • Host Integrity Monitor.
    • Baselining the System.
    • Installation Monitor.
    • Process Monitor.
    • File Monitor.
    • Registry Monitors.
    • Network Traffic Analysis.
    • Port Monitoring.
    • DNS Monitoring.
    • Simulation of Internet Services.

Analyzing the Code

    • Basics of Reverse Engineering.
    • Reverse Engineering Malicious Objects.
    • Extracting Malware Passwords.
    • Authentication Byepass.

Analyzing Malicious Documents

    • PDF and MS Office Document Structures.
    • PDF and MS Office Document Vulnerabilities.
    • Malware Extraction and Analysis Tools.
    • Malicous Documents analysis.

Beyond The Wall : The Challenging Part

    • Virtual Machines.
    • Distinguishing Real and Fake services.
    • Anti-Debugging Malwares.
    • Anti-Forensics Malwares.
Jay KumarCertified Malware Analyst