Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Champlain College Online
  4. Malware Analysis

Malware Analysis

Students will learn different methods of malware analysis and their respective strengths and weaknesses. Students will gain an insight into malware behavior, including infection vectors, propagation and persistence mechanisms and artifacts. Students will be taught methods of both behavioral analysis using controlled environments and reverse engineering. A range of malware types including web based, Trojan, rootkits and bots will be examined.

Course Overview

Overall Proficiency Level
4 - Expert
Course Catalog Number
DFS 540
Course Prerequisites

Complete DFS-520

Training Purpose
Functional Development
Skill Development
Management Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
National CAE Designated Institution
  • Online, Instructor-Led

Learning Objectives

  • Evaluate the malware threat facing organizations and individuals
  • Identify different types of malware and describe their capabilities including propagation and persistence mechanisms, payloads and defense strategies
  • Categorize the different infection vectors used by malware to propagate
  • Examine an operating system to determine if it has been compromised and evaluate the method of compromise
  • Use static and dynamic techniques to analyze malware and determine its purpose and method of operation
  • Write reports evaluating malware behavior, methods of compromise, purpose and method of operation.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Test and Evaluation
  • Vulnerability Assessment and Management
  • Collection Operations
  • Targets
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: