Students will learn different methods of malware analysis and their respective strengths and weaknesses. Students will gain an insight into malware behavior, including infection vectors, propagation and persistence mechanisms and artifacts. Students will be taught methods of both behavioral analysis using controlled environments and reverse engineering. A range of malware types including web based, Trojan, rootkits and bots will be examined.
Learning Objectives
- Evaluate the malware threat facing organizations and individuals
- Identify different types of malware and describe their capabilities including propagation and persistence mechanisms, payloads and defense strategies
- Categorize the different infection vectors used by malware to propagate
- Examine an operating system to determine if it has been compromised and evaluate the method of compromise
- Use static and dynamic techniques to analyze malware and determine its purpose and method of operation
- Write reports evaluating malware behavior, methods of compromise, purpose and method of operation.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Test and Evaluation
- Vulnerability Assessment and Management
- Collection Operations
- Targets
- Threat Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.