What to expectThis is a two day course that runs from 8:00a-5:00p. We will all sit together in one classroom, but the course is designed with three tracks, listed below. Regardless of the track you choose, you will have experienced instructors supporting you all along the way.
For those with no background in programming and/or little to no knowledge of windows internals.
You will spend the first day participating in instructor directed lectures and labs covering the safe handling of malware, basic static and dynamic analysis, the basics of x86 assembly, and Windows Internals. The second day you will be turned loose to reinforce and build upon what you learned by completing self-paced lessons, labs, and puzzles. These lessons will include topics such as writing malware signatures, identifying malware behavior, using a debugger, and analyzing malicious documents.
For those who have some foundational knowledge of programming and windows internals.
For malware analysts or those who have already taken a course on malware analysis. Those who choose this track should have a strong knowledge of windows internals and be comfortable working with binaries in a debugger.
You will stick with the “Main” group for a brief lecture on the safe handling of malware, and then you’ll be turned loose with two labs to analyze. The first will be a lightly obfuscated sample from a basic, but prolific, APT family. The second will be heavily obfuscated malware from a highly skilled APT family.
Who should attend?
- Security Operations Center Staff
- Reverse Engineers
- Incident Responders
- Software Engineers
- System Administrators