Thursday, August 27, 2009

Security 610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

I will be mentoring SANS 610: Malware Analysis in San Antonio starting Nov 3rd.

The class covers both behavioral and code analysis to provide a more rounded approach to malware reverse engineering.

The first half of the class shows students how examine a program's behavioral patterns and assembly code, and study techniques for bypassing common code obfuscation mechanisms. The course also takes a look at analyzing browser-based malware.

in the second half, the class will focus on static code analysis, learning to examine malicious code to understand its flow by identifying key logic structures and patterns, looking at examples of bots, rootkits, key loggers, and so on. The class will teach how to analyze self-defending malware through unpacking techniques and bypassing code-protection mechanisms and how to bypass obfuscation techniques employed by browser-based malicious scripts.

For more information or to register... SANS 610

2 comments:

  1. Hello,

    Do you happen to know if SANS offers a full week course? Some of my coworkers and I have been to a metored course (SE560) before, and think we'd prefer a full week "crash course". If they don't offer that, we may be interested in the mentored course.

    Thanks.

    ReplyDelete
  2. SANS does off this as a 4 day course -- if you look at the Sec 610 page (http://www.sans.org/training/reverse-engineering-malware--malware-analysis-tools-and-techniques-54-mid) you will see a list of Upcoming Events for this course. There are non scheduled in Texas, but there are some in California, DC and New Orleans in the next few months

    ReplyDelete

Random Quote