להשארת פרטים
סייבר ואבטחת מידע 
Malware Analysis is the study and close examination of malware to understand its origins, purpose, and potential impact on the system. Malware analysts accomplish their tasks by using various tools and expert-level knowledge to understand what a piece of malware can do and how it does it. This course provides participants with the practical skills and knowledge to analyze malware and exposes them to a critical set of tools required for their tasks.
The course helps prepare for the certification exam GREM (SANS).


Malware analysis using both Dynamic and Static analysis methods

Assembly language to examine malware

Reverse engineering malware using various tools

The first glimpse into Windows kernel


Cybersecurity practitioners

Cyber forensics analysts

Security engineers/researchers

Incident responders

Junior malware analysts or reverse engineers

Software developers
Module 1: Introduction to Malware Analysis
In the first module, students will study different types of malware and see how they operate, understand how the anti-virus works, and eventually develop an idea of approaching a malicious file and where to find it.
Module 2: Basic Static Analysis
Basic static analysis allows the malware-researcher to inspect the influences of malware on the system while it is in a static stage, that is, in code format. This phase is critical for collecting information about the malware for more advanced stages of the research.
Module 3: Basic Dynamic Analysis
Basic Dynamic Analysis is the initial method of inspecting and analyzing malware. Students will activate the malware in a protected sandbox environment during this stage and analyze its effects on the system. Various tools for malware analysis will be introduced and used by participants during this module.
Module 4: Assembly x86
This module will introduce Assembly language basics closest to the binary computer language that humans can read. Familiarization with Assembly will allow students to gain a closer insight into what lies at the base of the malware’s code and how it was meant to operate when activated and is an entry ticket into the world of reverse engineering.

קורסים ואירועים נוספים בתחום