Instructor: Tyler Hudak
Due to the prevalence and business impact of malware, security professionals increasingly need the skills necessary to analyze worms, bots and trojan horses. This one day course will walk attendees through the concepts, techniques and processes for analyzing malware. Students will take a “from-the-wild” malware sample in a hands-on environment and learn how to analyze its characteristics and behavior to determine what it does and the risk it presents.
About The Instructor
Tyler Hudak has extensive real-world experience in malware analysis and incident handling for Fortune 500 firms. He is a member of the Forum of Incident Response and Security Teams (FIRST) and leads the FIRST Malware Analysis Special Interest Group. Tyler brings his front line experience and proven techniques to bear in the training.
Title: Introduction to Malware Analysis
Instructor: Tyler Hudak
Date: 5/30/2013
Cost: $250
Class Size: 15 seats are available total (register early!)
Prerequisites: No previous experience in malware analysis is necessary as this course is designed for those who have never performed it before. However, an understanding of malware is recommended, and students must be experienced with Windows and a virtual machine (e.g. Taking snapshots, etc.)
Class Requirements: Students will be required to bring their own laptops for the class. Laptops will need a VMWare Workstation (NOT VMWARE PLAYER) or VirtualBox installation with an install of Windows (XP or higher) as the guest OS prior to the class. If the base OS is Windows, an installation of Cygwin may be helpful as well. All other tools will be provided.
Register for this class!
about rvasec
-
Recent Posts
- RVAsec 14 Video: Caleb Crable – SPF Shadowing: Give old services a chance to shine
- RVAsec 14 Video: Nick Copi – Following The JSON Path: A Road Paved in RCE
- RVAsec 14 Video: Philippe Caturegli – Internal Domain Name Collision 2.0
- RVAsec 14 Video: Andrew Case – Using Volatility 3 to Combat Modern Malware
- RVAsec 14 Video: Paul Asadoorian – The Security Professional’s Guide To The Linux Desktop