Malware: Reverse engineering (Live Virtual Class)

Blended learning

U wie riicht sech d'Formatioun?

System administrators, System architects and IT administrators, Systems engineers

Dauer

3,00 Dag(Deeg)

Sprooch(e) vun der Déngschtleeschtung

EN FR

Nächst Sessioun

Ziler

In this course, we address the issue of malware, a major societal concern. IT infrastructures now require security specialists to prevent attacks and analyze the damage caused by malware.

The lesson plan is in three parts:

  • What is a malware: taxonomies and different types and capabilities of malware. Analysis of classic schemes of compromises and adjacent infrastructures.
  • Malware analysis: Review of the basics needed for Windows process and assembly language operation. Triages techniques, dynamic and static analysis. Use of debugger, decompilers and disassembler. Using flow control graphs. Use of forensic detection tools.
  • Technique used by malware: Obfuscations of code, function call and flow. Encryption, polymorphisms and variations, Stealth.

Inhalt

What is a malware
  • Taxonomies and different types and capabilities of malware
  • Analysis of classic schemes of compromises and adjacent infrastructures
Malware analysis
  • Review of the basics needed for Windows process and assembly language operation
  • Triages techniques, dynamic and static analysis
  • Use of debugger, decompilers and disassembler
  • Using flow control graphs
  • Use of forensic detection tools
Technique used by malware
  • Obfuscations of code, function call and flow
  • Encryption, polymorphisms and variations, Stealth

Certificat, Diplom

Une attestation de participation sera transmise aux participants

Kontakt fir dës Formatioun

Nathalie Thielemans / Nassera Aici

Dës Formatioune kéinten Iech interesséieren

FR
Dag
Windhof (Koerich)
Informatik - Green IT
13.01.2025