Masterclass: Advanced Malware Hunting [AMH]

Total time
Location
At location
Starting date and place

Masterclass: Advanced Malware Hunting [AMH]

Global Knowledge Network Training Ltd.
Logo Global Knowledge Network Training Ltd.
Provider rating: starstarstarstarstar_border 7.7 Global Knowledge Network Training Ltd. has an average rating of 7.7 (out of 3 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
placeCQure Academy Virtual Delivery
4 May 2026 until 8 May 2026
Description

OVERVIEW

This course teaches the ways of identifying what malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium sized for enterprises and organizations. During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening – you will implement security in depth solutions, such as whitelisting or virtualization, in order to pro…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

OVERVIEW

This course teaches the ways of identifying what malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium sized for enterprises and organizations. During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening – you will implement security in depth solutions, such as whitelisting or virtualization, in order to protect assets.

AUDIENCE

Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.

To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5-8 years in the field is recommended.

CERTIFICATION

  • After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible to claim CPE points!

CONTENT

Module 1: What is malware

  • Malware History
  • Malware Goals
  • Types of Malware
  • Advanced Persistent Threats
  • Indicators of Compromise

Module 2: Introduction to Malware Analysis

  • Types of malware analysis
  • Goals of malware analysis
  • Impact analysis
  • Containment and mitigation
  • Incident prevention and response playbooks
  • Setting up sandbox environment
  • Cloud-based malware analysis

Module 3: Static malware analysis

  • Executable analysis
  • Extracting secrets
  • Determining if file is packed or obfuscated
  • Fingerprinting the malware
  • Pattern matching using YARA

Module 4: Behavioral malware analysis

  • Malware detonation
  • Sysinternals suite
  • Network communication analysis
  • Monitoring system events
  • Memory dump analysis
  • Simulating real environment

Module 5: Malicious non-exe files

  • Alternative binaries
  • PowerShell scripts
  • Office documents
  • JScript
  • HTML documents
  • Living off the land binaries

Module 6: Advanced techniques used by malware

  • Malware persistence methods
  • Malware stealth techniques
  • Covert channel communication
  • Domain Generator Algorithms
  • Anti-VM and Anti-debugging tricks

Module 7: Defending against malware

  • Windows security solutions
  • Anti-Virus software
  • EDR software
  • Principle of least privilege
  • Application Whitelisting
  • Virtualization
  • Network and domain segmentation
There are no reviews yet.
    Share your review
    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.