This Live Virtual Class consists of 14 Modules in terms of Malware Analysis & Reverse Engineering. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.
Module 1. APT Attacks & Malware Analysis
- Understanding advanced persistent threats
- Attacker tactics, techniques & procedures (MITRE ATT&CK)
- The incident response process for malware attacks
- APT attack vectors and types of malware
- Setting up isolated lab environment
Module 2. Basic Static Analysis
- Investigating malware decrypted strings
- Examining malware headers (PE)
- Understanding functionality through imported Windows APIs
- Detecting and unpacking encrypted malware
- Hands-on lab with real malware samples
Module 3. Behavioral Analysis & Sandboxing
- Network forensics for malware activity
- Monitoring process, file system, and registry activity
- Determining indicators of compromise (IoCs)
- Hands-on lab analyzing real malware
Module 4. Spear-phishing Attacks with Malicious Documents
- Analyzing malicious Office documents with VBA macros
- Examining and dissecting malicious PDF files
- Hands-on lab with real phishing documents
Module 5. Intro To x86/x64 Assembly
- CPU registers and assembly instructions
- Assembly language and memory handling
- Reversing assembly code to higher-level languages
- Working with variables and memory structures
Module 6. Static & Dynamic Code Analysis
- Using IDA Pro for static analysis
- Hands-on lab with static code analysis
- Using Ollydbg/x64dbg for dynamic analysis
- Investigating Windows API calls
- Key indicators in code analysis
Module 7. Malware Functionalities Analysis
- Analyzing droppers & downloaders
- Persistence mechanisms
- Keylogging techniques
- Banking Trojans & Man-in-the-Browser attacks
- Point of Sale malware characteristics
- Writing custom YARA rules
Module 8. Unpacking Packed Samples
- Using generic unpackers
- Manual unpacking techniques
- Overcoming anti-reverse engineering protections
Module 9. Dealing with Encryption
- Reversing basic encryption algorithms
- Working with complex encryption (RC4, AES, public key)
- Uncovering encrypted strings, APIs, and C2 domains
- Hands-on lab with encrypted malware
Module 10. Ransomware analysis
- Basic analysis of ransomware behavior
- Code analysis of encryption functionality
- Understanding file encryption algorithms
- Assessing decryption possibilities
- Real-world ransomware case study
Module 11. Windows Forensics & Timeline Analysis
- Digital forensics goals and acquisition techniques
- Analyzing NTFS Master File Table and deleted files
- Windows Change Logs and Prefetch analysis
- Registry analysis for persistence
- Creating attacks timelines
Module 12. Advanced Techniques: Fileless Malware & API Hooking
- Understanding process internals
- Detecting code injection techniques
- Process hollowing analysis (Stuxnet technique)
- API Hooking and IAT hooking detection
Module 13. Memory Forensics & Volatility
- Memory acquisition techniques
- Introduction to Volatility framework
- Identifying suspicious processes
- Detecting injected and hidden DLLs
- Hands-on with Stuxnet memory dump
Module 14. Reporting & Threat Hunting
- Professional malware analysis report writing
- Introduction to threat hunting
- Endpoint threat hunting with Sysmon
- Creating Sigma rules
Audience



