This Course is available in the following format:
Reverse Engineering Malware Training Course with Detailed Hands-on Labs and Exercises
Learn how to perform static malware analysis with this Reverse Engineering Malware Training
Reverse engineering is a vitally important skill for today’s expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today’s ever evolving threats.
In this 5 day hands-on Reverse Engineering Malware Training course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. With Reverse Engineering Malware Training, you will also learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:
• Hostile Code & Malware, including: Worms, Viruses, Trojans, Rootkits and Bots
• Vulnerabilities in Binaries, including: Format string vulnerabilities, buffer overflow conditions, and the identification of flawed cryptographic schemes
• Binary obfuscation schemes, used by: Hackers, Trojan writers and copy protection algorithms
Additionally with Reverse Engineering Training, you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET. ENO will train you on the standard reverse engineering programs IDA Pro, Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers with this Reverse Engineering Malware Training.
Why Take This Course?
The malware analysis process taught in Reverse Engineering Malware Training helps incident responders and other security professionals assess the severity and repercussions of a situation that involves malicious software so that they can plan recovery steps. Forensics investigators also learn about the key characteristics of malware discovered during the examination, including how to establish Indicators of Compromise and obtain other threat intelligence details for analyzing, scoping, and containing the incident.
What threat does the malicious or suspicious program pose? What do its mechanics reveal about the adversary’s goals and capabilities? How effective are the company’s security controls against such infections? What security measures can strengthen the organization’s infrastructure from future attacks of this nature? This Reverse Engineering Malware Training course teaches the skills necessary to answer these and other questions critical to an organization’s ability to handle malware threats and related incidents.
• CISA Training | Certified Information Systems Auditor Training
• CISM Training | Certified Information Security Manager Training
• CISSP Training | Certified Information Systems Security Professional Training
• CompTIA Cybersecurity Analyst+ Training | CSA+ Certification Training
• CompTIA Security+ Certification Training
• Computer Forensics Training
• CyberSec First Responder: Threat Detection and Response Training
• Cyber Threats Detection and Mitigation Training
• Cybersecurity Investigations and Network Forensics Analysis
• Ethical Hacking Training | CEH Certification Training
• Fundamentals of Information Security Training
• Hacker Tools, Techniques, Exploits, and Incident Handling Training
• Network Penetration Testing and Ethical Hacking Training
• Reverse Engineering Malware Training
• Industrial Control Systems – ICS/SCADA Security Essentials Training
• Systems Forensics, Investigation, and Response Training
• If you are familiar with some aspects of this Reverse Engineering Malware Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Reverse Engineering Malware Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Reverse Engineering Malware Training course in manner understandable to lay audiences.
Audience / Target Group:
The target audience for this Reverse Engineering Malware Training course:
• Incident responders
• Forensic investigators
• Threat operation analysts
The knowledge and skills that a learner must have before attending this Reverse Engineering Malware Training course are:
• Have a computer system that matches the stated laptop requirements; some software needs to be installed before students come to class.
• Be familiar with using Windows and Linux operating environments and be able to troubleshoot general OS connectivity and setup issues.
• Be familiar with VMware and be able to import and configure virtual machines.
• Have a general idea about core programming concepts such as variables, loops, and functions in order to quickly grasp the relevant concepts in this area; however, no programming experience is necessary.
What You Will Learn:
Upon completing this Reverse Engineering Malware Training course, learners will be able to meet these objectives:
• Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field.
• Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.
• Move beyond automated “input and output” testing of binaries, commonly used by fuzzers and other analysis tools.
• More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.
Reverse Engineering Malware Training – Course Syllabus:
Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering. Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them. Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.
Malware Analysis Fundamentals
• Assembling a toolkit for effective malware analysis
• Examining static properties of suspicious programs
• Performing behavioral analysis of malicious Windows executables
• Performing static and dynamic code analysis of malicious Windows executables
• Interacting with malware in a lab to derive additional behavioral characteristics
Reversing Malicious Code
• Understanding core x86 assembly concepts to perform malicious code analysis
• Identifying key assembly logic structures with a disassembler
• Following program control flow to understand decision points during execution
• Recognizing common malware characteristics at the Windows API level (registry manipulation, keylogging, HTTP communications, droppers)
• Extending assembly knowledge to include x64 code analysis
Malicious Web and Document Files
• Interacting with malicious websites to assess the nature of their threats
• Analyzing suspicious PDF files
• Examining malicious Microsoft Office documents, including files with macros
• Analyzing malicious RTF document files
In-Depth Malware Analysis
• Recognizing packed malware
• Getting started with unpacking
• Using debuggers for dumping packed malware from memory
• Analyzing multi-technology and file-less malware
• Code injection and API hooking
• Using memory forensics for malware analysis
Examining Self-Defending Malware
• How malware detects debuggers and protects embedded data
• Unpacking malicious software that employs process hollowing
• Bypassing the attempts by malware to detect and evade the analysis toolkit
• Handling code misdirection techniques, including SEH and TLS Callbacks
• Unpacking malicious executable by anticipating the packer’s actions
Malware Analysis Tournament
• Behavioral malware analysis
• Dynamic malware analysis (using a debugger)
• Static malware analysis (using a disassembler)
• PDF document analysis
• Office document analysis
• Memory analysis
Certification & Compliance
Certified Reverse Engineering Analyst:
In any hands on reverse engineer training course, it’s important to have the opportunity to prove, to current or potential employers, that you have the skills you claim you do. This Reverse Engineering Malware Training course prepares you for the premier reverse engineering certification in the industry, the CREA. The exam is given on-site and InfoSec Institute has achieved a 93% pass rate for this certification.