Secnic Certified Malware analyst (SCMA)

Secnic Certified Malware analyst (SCMA)

Real-World Scenario (Course Overview):

You are the leader of an incident response team charged with conducting high-profile cyber crime investigations for a major corporate agency. This organization is hit with millions of hacking attempts daily. The enterprise network has been under attack for the past two weeks and members of your team have been working around-the-clock to contain the incident. After many man-hours, the network seemed calm and the attack appeared to be thwarted; or so you thought. Exactly one week later, a member of the Tier II team observes that attackers have successfully penetrated valuable systems and are pilfering crucial government data to a foreign country. Some of the malicious software (malware) has been captured, but you have limited expertise to answer critical questions about the compromise. Senior agency’s officials are demanding immediate answers as to how the malware got into the network, where it originated from, what critical data was compromised, who created the malware, and how the agency can defend against this type of attack in the future. Do you have the requisite skills to provide quick and accurate answers to the above high profile penetration and mitigate future attempts?

Today’s cyber adversaries are highly skilled and sophisticated hackers who are either part of state-sponsored or organized crime. These elite hackers are so advanced that current security measures do not detect, let alone prevent their attacks. These criminals are paid and spend ample time conducting reconnaissance about their targets, then customizing their attack towards the victim. The firewall doesn’t prevent the attack and the IDS doesn’t detect these intrusions. These cyber criminals continue to leverage users’ susceptibility to social engineering attacks to infiltrate critical networks. Once inside the network, they lay low on the radar and often go undetected since there are no known signatures.

Malware Analysis is a time-consuming effort that requires specialized expertise, procedures, tools, and real-world analysis skills. Secnic  Malware Analysis course teaches students the step-by-step process for quickly analyzing malware to determine the extent of their malicious intent and device appropriate countermeasures.

Secnic Benefits:

Through years of real-world hands-on cyber security, digital forensics, and incident response experience, Secnic has supported private companies and. The benefits of our Secnic Certified Malware analyst

course include:

  • Skills to establish and fortify an organization’s security, forensics, and incident response capabilities
  • Customized private sessions, tailored towards organizations’ unique environments
  • Detailed step-by-step and how-to instructions
  • Instructor-led and student-performed hands-on exercises
  • Real-world simulations of malicious software in a lab environment
  • Seasoned expert instructors with real-world hands-on consulting and training experience
  • Arsenal of take-aways (tools, templates, guides, and relevant forensics resources)
  • Up-to-date course content, addressing emerging malware analysis challenges
  • Small class sizes ensuring maximum student-instructor interaction
  • Vendor-neutral content, covering commercial and freeware tools

Target Audience:

The Malware Analysis course is targeted towards technical professionals, including:

  • Computer Forensics Investigators
  • Incident Responders
  • Malware Analysts
  • Information Security Professionals
  • Technology Enthusiasts

Course Format:

  • Interactive presentations by security, forensics, and incident response expert instructor
  • Certified Malware analyst Lab Exercises performing computer forensics and incident response

Course Duration:

 Course Cost: On Request

Course Objectives:

Upon successful completion of the Secnic Certified Malware analyst course, each participant will be armed with the knowledge, tools, and processes required in conducting malware analysis and producing a report that can withstand legal scrutiny. Specifically, students will possess relevant knowledge and real-world hands-on skills in:

  • Introduction to Malware Analysis
  • Malware Hiding Places
  • Building a Malware Analysis Lab (Environment)
  • Static Analysis
  • Dynamic Analysis
  • Code Analysis
  • Malicious Document Analysis
  • Identifying and Protecting against Malware
  • Malware Challenges in the Real-World