Introduction to Malware Analysis

Georgia Tech Professional Education

How long?

  • 3 days
  • in person

Georgia Tech Professional Education

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.

Who should attend

This course is designed for information assurance officers (IAOs) and managers (IAMs), information security professionals charged with threat detection and incident response, and IT professionals seeking a greater understanding of potential malware threats and exploitation techniques. Familiarity with programming is assumed.

About the course

Malware is a growing threat to the information and intellectual property of organizations. This introductory course will provide a foundational understanding of malicious software, how malware has shaped the global cybersecurity landscape, and malware's future impact. Discussions and hands-on exercises will demonstrate malware analysis processes and their complexities, as well as illustrate how to appropriately size, design, and build an analytical capability best suited for your organization. You will prepare an analysis test-bed and analyze multiple malware samples. Explore advanced techniques and tools, including data exfiltration and stealthy operation, to understand the tactics of malware authors.

What You Will Learn

  • Malware overview
  • Analysis environment creation
  • Static analysis
  • Dynamic analysis
  • Memory analysis

How You Will Benefit

  • Develop foundational knowledge of malicious software, including its forms, traits, author motivations, and impacts.
  • Identify, discuss, and practice sound malware analysis processes.
  • Conduct analysis on multiple malware samples using modern disassembly, debugging, and analysis tools.
  • Determine how to build an analytical capability to fit your organization, considering resource limitation and best practices.
  • Discover black hat exploitation techniques, obfuscation techniques, and indicators of compromise.

Content

MALWARE OVERVIEW

  • Trends
  • Capabilities
  • Delivery mechanisms
  • Obfuscation techniques

ANALYSIS ENVIRONMENT CREATION

  • Virtualization
  • Maintaining anonymity
  • Tools

STATIC ANALYSIS

  • Assembly language overview/review
  • Reverse engineering
  • Analyzing with a disassembler
  • Using static tools for analysis (hashes, strings, libraries)

DYNAMIC ANALYSIS

  • Analyzing with a debugger
  • Monitoring processes and registry changes
  • Analyzing network traffic
  • Sandboxes

MEMORY ANALYSIS

  • Memory dumps
  • Identifying suspicious indicators

Experts

Barbara Fox

Barbara Fox (CISSP) is a Research Scientist in the Georgia Tech Research Institute (GTRI) Cyber Technology and Information Security Laboratory (CTISL). Her research focuses on risk management, emerging threats, malware analysis, and insider threat. Ms. Fox combines a rich background in instructio...

George Macon

My name is George Macon, and I’m currently a Ph.D. student at the Georgia Institute of Technology researching computer security in the Communications Systems Center under the advisement of Dr. John Copeland. I work as a Graduate Research Assistant in the Cyber Technology and Information Security...

Course reviews

Some reviews for this course are not publicly available

Introduction to Malware Analysis at Georgia Tech Professional Education

From  $1,695

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.