Instructor

Amr Thabet

Former Malware Researcher at Symantec and a Speaker in Defcon 21

Amr is a former malware researcher at Symantec and currently a vulnerability researcher at Tenable. He is the author of Mastering Malware Analysis published by Packt Publishing. He had worked on the analysis of multiple nation state-sponsored attacks including the NSA malware families (Stuxnet & Regin), North Korea (Contopee), and many other highly advanced attacks.

Amr has spoken at top security conferences all around the world, including DEFCON and VB Conference. He was also featured in Christian Science Monitor for his work on Stuxnet.

What You Will Learn

Malware Analysis & Digital Investigations Training is a hands-on training covering targeted attacks, Fileless malware, ransomware attacks with their techniques, strategies, and the best practices to respond to them. 

You'll experience hands-on training with labs on performing malware analysis, memory forensics, and full attack investigations with different real-world samples. Course objectives are:

  • Understand the lifecycle of a targeted attack and the techniques attackers use to get into the target organization (Spear-phishing, drive-by-download…etc.).
  • Perform basic static & behavioral analysis of malware in an isolated and virtualized environment.
  • Understand the basics of the x86 assembly language.
  • Be able to determine malware functionality using IDA Pro and Ollydbg/x64dbg.
  • Be able to extract network and host-based IOC's.
  • Be able to analyze downloaders, droppers, keyloggers, fileless malwares, HTTP backdoors, etc.
  • Perform memory forensics on an infected machine and extract the malware artifacts from its memory.

Who is this course for?

This training is for security professionals who want to expand their skills or beginners and newcomers to the malware incident response wanting to learn Malware Analysis, Reverse Engineering, and Memory Forensics. It's a great resource for

  • SOC Analysts
  • DFIR Professionals
  • Malware Analysts
  • Security Researchers


Syllabus

    1. Watch First

    2. Mastering Malware Analysis Book

    3. Resources

    1. Download The Virtual Machine

    2. Installing VM in VirtualBox

    3. Installing VM in VMWare

    4. Copying Malware Samples To VM

    5. Executing Commands inside the VM

    1. 01 - Intro

    2. 02 - History

    3. 03 - APT Attacks

    4. 04 - Malware Types

    5. 05 - Analyzing Malicious Documents

    6. 06 - Scenario 01 - FIN7 Spear-phishing Attack

    7. Workbook & Labs

    8. Quiz #1

    1. 01 - Incident Discovery And Log Analysis P1

    2. 02 - Incident Response And Log Analysis P2

    3. 03 - Splunk

    4. 04 - Packet Analysis

    5. 05 - Packet Analysis Demo

    6. Workbook & Labs

    7. Quiz #2

    1. 01 - Malware Analysis Process

    2. 02 - How To Approach a Sample

    3. 03 - Basic Static Analysis

    4. 04 - Behavioral Analysis

    5. 05 - Pony Malware - Tool Intro

    6. 06 - Pony Malware - Basic Static Analysis

    7. 07 - Pony Malware - Behavioral Analysis

    8. Workbook & Labs

    9. Quiz #3

    1. C++ Intro 01 - Get Started with your first program

    2. C++ Intro 02 - Memory And Variables

    3. C++ Intro 03 - Conditional Commands

    4. C++ Intro 04 - Loops

    5. C++ Intro 05 - Functions

    6. C++ Intro 06 - Communicate with the world

    7. 01 - x86 Assembly And Memory

    8. 02 - x86 Assembly Instructions

    9. 03 - x86 Assembly To C

    10. 04 - x86 Assembly Local Variables

    11. 05 - Static Analysis Level 00

    12. 06 - Static Analysis Level 01

    13. 07 - Static Analysis Level 02

    14. 08 - Static Analysis Level 03

    15. 09 - Intro to Dynamic Analysis

    16. 10 - Dynamic Analysis Level 03

    17. 11 - Dynamic Analysis Level 04

    18. 12 - Example From a Real Malware

    19. 12 - Example From a Real Malware

    20. Workbook & Labs

About this course

  • $997.00
  • 126 lessons
  • 41.5 hours of video content

FAQ

  • What are the prerequisites for this training?

    Basic windows administrations (Linux as well is preferred) and a good understanding of windows protocols.

  • Is this training a hands-on training?

    Yes, it will be full of hands-on practice.

  • Who is this training best suited for?

    Those who seek to learn and advance their malware analysis skills. Be it incident handler, soc analysts, threat researchers, or malware analysts.

  • Do I have to be an expert coder to understand the content?

    The course requires a basic understanding of cybersecurity terminologies. Even if you haven’t written a single line of code before, don’t worry, this program is still for you.

  • Will I have direct access to the instructor during the course?

    Sure, the instructor will be easily reachable during the course. In addition, as a student, you will get a free 30 minutes session with the instructor if you need some sort of guidance or mentorship.

  • Does the course talk about real world attacks?

    Definitely. The course discusses some of the recent malwares such as Emotet, Wannacry, and NotPetya.

7 days 100% Money Back Guarantee

We want you to be 100% satisfied with your purchase, and stand by the quality of our resources. Should you for any reason be unhappy with your purchase we offer a 7-day money-back guarantee. No questions asked!