Advanced Malware Analysis

MANDIANT july 21-24


$3700

Ends February 1

$3900

Ends June 1

$4100

Ends July 20

$4400

July 21-24


Overview

Malware authors sometimes take deliberate steps to thwart the reverse engineering of their malware. Students will learn to combat sophisticated malware head-on by studying common obfuscation techniques and then be challenged to defeat several difficult hands-on. They will learn how to specifically combat against packing, anti-disassembly, anti-debugging and anti-virtual machine techniques. Since not all malware samples are written in plain C the students will also learn how to identify and analyze samples written in alternate programming languages. A practiced and robust skill set in Windows APIs and the Intel x86 architecture is required. Students will receive a FREE copy of the book, "Practical Malware Analysis" written by Mike Sikorski.

What you will learn

Who Should Attend the Class

Beginner to intermediate malware analysts, information security professionals, forensic investigators or others requiring an understanding of how to overcome difficult challenges in malware analysis.

What to bring

Students must bring their own laptop with VMware Workstation, Server or Fusion installed (VMware Player is acceptable, but not recommended). Laptops should have at least 20GB of free space.

A licensed copy of IDA Pro is highly recommended to participate in ALL labs, but the free version can be used in most cases.

Students who cannot meet the laptop requirements because of onsite registration or other reasons may contact MANDIANT at [email protected] to see if a laptop can be provided for you.

What You Will Get

Prerequisites

Trainers

Michael Sikorski is a Technical Director at Mandiant and co-author of the book "Practical Malware Analysis". His previous employers include the National Security Agency and MIT Lincoln Laboratory. Mike frequently teaches Malware Analysis to a variety of audiences including the FBI and Black Hat.

Jerrold "Jay" Smith is a Principal Consultant at Mandiant where for the past four years he has focused on malware analysis and supported the company's Federal Services work. Jay is also a contributing author to the book "Practical Malware Analysis" and has frequently taught malware analysis. Prior to joining Mandiant he worked at the National Security Agency.