Instructor-led training course
This course provides an introduction to the file formats, tools, and methodologies used to perform malware analysis on malicious documents using a practical hands-on approach. Students can learn to pinpoint and analyze suspicious document components and how to extract host and network-based indicators from them. This course includes demonstrations and hands-on labs that contain real malware.
Prerequisites: General knowledge of computer and operating system fundamentals. Exposure to programming fundamentals is recommended.
After completing this course, learners should be able to:
Malware researchers, software developers, information security professionals, incident responders, computer security researchers, corporate investigators, and others who need to understand how malware operates and the processes involved in performing malware analysis.
In-classroom instructor-led training
Students are required to bring their own laptop that meets the following specs: