A Certificate of Completion is offered for each class.
These courses help attendees gain experience in determining whether a piece of code is malicious and how it can impact an infrastructure. Focusing on both static and dynamic techniques; trainees will expand their knowledge by using, sandboxing, binary analysis, code de-obfuscation, and low -level programming.
Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques
Learn how to manually unpack the most advanced obfuscation protections.
Learn how to implement effective network intrusion prevention.
No Source? No Symbols? No Problem.
This introductory course is for those interested in entering the field of malicious software analysis.
Essential background material for effective reverse engineering.
This two day class will cover useful techniques and methods for incident response in the field when machines are suspected of intrusion with stealthy malware.
This class is meant to impart cutting-edge understanding of malicious code analysis upon attendees, ultimately taking them to an advanced level of reverse engineering skills applicable to other security domains.
An in-depth understanding of how advanced stealth malware works, how it interacts with the operating system, underlying hardware and network.