Reverse Engineering Malware
This course is specially designed for those who are willing to have in-depth learning about malware analysis. Participants of the course will be able to explore the different tools and techniques used to perform analyses on the most prevalent malware samples. This includes the tools that are used for network monitoring, assembling, debugging and others that are available on the Internet.
Reverse Engineering Malware Schedule
|Training Subject||Duration (Day)||Price/Person||Schedule||Status|
|Reverse Engineering Malware||5||IDR 14.000.000||9 - 13 December 2019||OPEN|
After completing this course, participants are expected to be able to:
- Understand how malware behaves within and against a system.
- Perform analyses on existing and potential malware based on file formats.
- Perform analyses on binary existing within the binary.
- Utilize the necessary tools, such as obfuscator and crypter
- Perform incident report analyses
- Perform FUD techniques and analyses
Who Should Join This Course?
- Individuals who have dealt with incidents involving malware and wanted to have a better understanding of the key aspects of malicious programs.
- Technologists who have previously experimented with malware analysis and are looking to further their expertise in the area.
- Forensic investigators and security practitioners looking to expand their skillsets and play a pivotal role in the incident response process.