3-DAY TRAINING 3 – A PRACTICAL APPROACH TO MALWARE ANALYSIS AND MEMORY FORENSICS

DELIVERY: VIRTUAL LIVE STREAM 

DATE: 24, 25 & 26 May 2021

TIME: 09:00 to 17:00 CEST/GMT+2

Price: USD3299

 

 

 


This hands-on training teaches concepts, techniques and tools to understand the behavior and characteristics of malware by combining two powerful techniques, malware analysis and memory forensics.

Overview

 

Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics and incident response. Adversaries are becoming more sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations. This makes detecting, responding and investigating such intrusions increasingly critical for information security professionals. Malware analysis and memory forensics have become a must-have skill for fighting advanced malwares, targeted attacks and security breaches.

This course will introduce attendees to basics of malware analysis,reverse engineering, Windows internals and memory forensics. It will then gradually progress deeper into more advanced concepts of memory forensics.

This course uses hands-on labs using real world malware samples and infected memory images (Crimewares, APT malwares, Rootkits etc) to help attendees gain better understanding of the subject. The training also shows how these techniques can be incorporated in a sandbox to automate malware analysis. After taking this course attendees will be equipped with skill to analyze, investigate and respond to malware related incidents.

Students will be provided with:

– Course material
– Lab solution material
– Videos used in the course
– Malware samples used in the course/labs
– Memory Images used in the course/labs
– Custom Scripts
– Linux VM (to be opened with VMware Workstation/Fusion) containing necessary tools and samples

Key Learning Objectives

  • How malware and Windows internals work
  • How to create a safe and isolated lab environment for malware analysis
  • What are the techniques and tools to perform malware anlaysis
  • How to perform static analysis to determine the metadata associated with malware
  • How to perform dynamic analysis of the malware to determine its interaction with process,filesystem, registry and network
  • How to perform code analysis to determine the malware functionality
  • How to debug a malware using tools like IDA pro, Ollydbg/Immunity debugger
  • What is Memory Forensics and its use in malware and digital investigation
  • Ability to acquire a memory image from suspect/infected systems
  • How to use open source advanced memory forensics framework (Volatility)
  • Understanding of the techniques used by the malwares to hide from Live forensic tools
  • Understanding of the techniques used by Rootkits(code injection, hooking etc)
  • Investigative steps for detecting stealth and advanced malware
  • How memory forensics helps in malware analysis and reverse engineering
  • How to incorporate malware analysis and memory forensics in sandbox
  • How to determine the network and host based indicators (IOC)
  • Techniques to Hunt Malwares

Who Should Attend

This course is intended for anyone interested in learning malware analysis and memory forensics.

This includes:

  • forensic practitioners
  • incident responders
  • cyber security investigators
  • malware analysts
  • system administrators
  • software developers
  • students and
  • curious security professionals new to this field

What Students Say About This Training

“It is an excellent Malware introductory course which helps me to learn basic ideas and provide a guideline for further study in the future”

“Well organised & run”

“Particularly appreciative of how the course materials were well-prepared, and how informative [the] explanations were”

“Great course. Next time I would like to be on site.”

“Duration (3 days) was a bit too cramp for the topics to be covered.”

Prerequisite Knowledge

The course assumes no prior knowledge of the subject and starts from the basics and slowly progresses towards advanced topics.

– Students Should be familiar with using Windows/Linux
– Students Should have an understanding of programming concepts, while programming experience is not mandatory.
– Students Should have basic understanding of malware and its role in cyber attacks

Hardware / Software Requirements

– Laptop with minimum 6GB RAM and 40GB free hard disk space
– Laptop with USB ports – lab samples, and custom Linux VM will be shared via USB sticks
– VMware Workstation or VMware Fusion (even trial versions can be used).
– Windows Operating system (preferably Windows 10 64-bit, even Windows 8 and Windows 7 versions are fine) installed inside the VMware Workstation/Fusion. Students must have full administrator access for the Windows operating system installed inside the VMware Workstation/Fusion.

Note: VMware Player or VirtualBox is not suitable for this training.

TRAININGS
Location: Training Rooms Date: May 24, 2021 Time: 9:00 am - 5:00 pm Monnappa K A

Register to the session!


Haxpositie BV (KvK Number: 58533907), Kloveniersburgwal 19-G, 1011 JV Amsterdam, The Netherlands