Understanding and Managing the Threat of Malware

Provided by

Enquire about this course

About the course

This 3-day workshop is designed to give delegates the technical ‘hands-on’ understanding and crucially analysing modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains many hands-on exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.

Prerequisites

The prerequisites for this workshop are attendance of the QA Security Fundamentals course (www.qa.com/QASECFUND) or equivalent knowledge.

Outline

Introduction to Malware

    History
    Definitions
    Sources
    Exercise: Building a Sandbox

The Malware Family

    Viruses
    Worms
    Trojans
    Bot Nets
    Rootkits
    Web Exploit Kits
    Ransomware
    Exercise: Rootkit infection
    Exercise: Ransomware Infection

Threats and Exploits

    Threat Intelligence
    Threat & Exploit Sources
    Exploits against the system
    Exercise: Exploiting the operating system

Distribution and Infection

    Distribution Methods and Tools
    Infection Vectors

Testing Scoring and Submission

    Standards, Schemes & Scoring

Operating Systems and Files

    Memory & File Management

System Hardening and Baselining

    Operating Systems & Applications
    Memory and System

Static Analysis

    Basic vs Advanced Analysis
    Tools & Techniques
    Exercise: Malware analysis - Static

Malware Evasion

    How Malware avoids Detection

Malware Discovery Techniques

    How to detect Malware

Dynamic Analysis

    Using Dynamic Analysis Tools
    Sandboxing Malware
    Dynamic Analysis and Reporting
    Exercise: Dynamic Malware Analysis
    Exercise: Memory Analysis

 

Enquire

Start date Location / delivery
13 Aug 2019 London Book now
13 Aug 2019 Online Book now
14 Oct 2019 Leeds Book now
21 Oct 2019 London Book now
21 Oct 2019 Online Book now
10 Dec 2019 London Book now
10 Dec 2019 Online Book now
10 Feb 2020 London Book now
10 Feb 2020 Online Book now

Related article

Addressing The Weakest link John McGlone at The Training Centre outlines how you can address the weakest link in cybersecurity. Companies spend a s...