Certified Advanced Malware Analysis Investigator
Upskilling Course, 40 Academic Hours
Deep Dive: Malware Threats and Malware Analysis Techniques
- Level: Intermediate
Designed for cybersecurity professionals looking to advance their expertise, this one-of-a-kind course addresses the challenge of constantly evolving malware threats. It provides participants a deep dive into malware threats and malware analysis techniques.
By enrolling in this course, you will develop knowledge and skills in analyzing and mitigating complex malware effectively.
Who Is This Course For?
- Incident responders (TIER 2 and above) and leaders of incident handling teams
- System administrators
- Cyber security practitioners and security architects
- Experienced cyber and IT professionals
- Cybersecurity investigators
- Students studying for a technology Bachelor’s degree
Prerequisites
- Advanced knowledge of Microsoft operating systems
- Understanding of networks and protocols
- Basic knowledge of monitoring and security devices
Learning Objectives
- Detect, identify and contain the most common cybersecurity incidents
- Look for suspicious activity of malware and malicious code on your endpoints
- Analyze malware with several techniques (static and dynamic)
- Comprehend the reverse engineering process
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- “Swiss Army Knife” - 3Gb of IR tools
- Over 20 hours of practical learning experience through hands-on activities on local environments and our virtual cyber lab
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Module 1: Physical Environment (PE) Files (2 Theoretical Hours, 6 Practical Hours)
- Headers
- Sections
- Imports/Exports
- Resources
- Common File Format (CFF) Explorer
Module 2: WinAPI (1 Theoretical Hour, 1 Practical Hour)
- Concept
- Common Dynamic Link Libraries (DLLs)
- Kernel Objects
- Ansi and Unicode
- Suspicious APIs and Their Uses
Module 3: Extra Static Analysis (3 Theoretical Hours, 4 Practical Hours)
- Packers
- Obfuscators
- Virtual Machines (VMs)
- Crypters
- RDG Packer Detector
- Entropy
Module 4: Basic and Advanced Dynamic Analysis (3 Theoretical Hours, 4 Practical Hours)
- Sysinternals
- Apimonitor
- Wireshark
- ApateDNS
- InetSIM
- Netcat
- Sandboxes
Module 5: Assembly Crash (1 Theoretical Hour, 2 Practical Hours)
- Architecture (x86)
- Memory management
- Registers
- Instructions
- Opcodes
Module 6: Reverse Engineering (RE) Methodology (2 Theoretical Hours, 3 Practical Hours)
- What is Reverse Engineering (RE)?
- Approaching RE
- Decompliers
Module 7: Debugging Methodology (2 Theoretical Hours, 1 Practical Hour)
- What Is Debugging?
- Approaching Debugging
- Debugger Overview
Module 8: Intrusion Detection Appliance (IDA) (2 Theoretical Hours, 2 Practical Hours)
- Overview
- Cheatsheet
- Flirt Signatures
Module 9: Malicious Techniques (2 Theoretical Hours)
- Hooking
- Code Injection
- Anti VM/Debug
- Obfuscation
- Persistence
- Dynamic Function Resolving (using APIs and using Process Environmental Bloc – PEB)
- Encryption
Module 10: Course Final Project (2 Practical Hours)
- Final Hands-On Project
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!