Course Overview
Learning Objectives
- Recognizing the Exploit Vector
- Unraveling Exploit Obfuscation
- Circumventing Exploit Kit Encryption
- Understanding Moving Target Communications
- Detecting Angler in the Wild
- Performing Safe Dynamic Analysis
- Analyzing Files Statically
- Reversing Malware with Debugging Tools
- Reversing Malware with IDA pro
- Customizing Reports: From Researchers to CISOs
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Operations
- Digital Forensics
- Targets