Original Price
₦10,000.00Discounted Price
₦10,000.00Ratings
4.0 ( reviews)
Duration
8 Weeks
Training Type
IureTechnologies
IDA Pro, Ghidra, Cuckoo Sandbox, PEiD, Sysinternals, WiresharkParticipants should have intermediate knowledge of operating systems and cybersecurity. Familiarity with scripting and file systems is recommended.
A laptop with access to sandbox environments and malware analysis tools is essential.
This course is ideal for security analysts, forensic investigators, and malware researchers.
The course explores static and dynamic malware analysis techniques:
- Malware Types: Trojans, ransomware, worms, and fileless malware.
- Static Analysis: File inspection, strings, and disassembly.
- Dynamic Analysis: Behavior monitoring, sandboxing, and debugging.
- Reverse Engineering: Tools and techniques for code analysis.
- Reporting: Documentation, IOC extraction, and threat attribution.
Modules are designed to build malware detection and analysis skills:
- Weekly labs on malware samples and sandbox testing.
- Mini-projects focused on reverse engineering and IOC generation.
- Peer reviews and malware classification exercises.
- Capstone project: Analyze a malware sample and produce a detailed report.
Classes are held twice weekly:
- One lecture session covering malware theory and case studies.
- One lab session for hands-on analysis and reporting.
- Optional office hours for mentoring and tool support.
This course teaches how to analyze and understand malicious software. It emphasizes safe handling, reverse engineering, and threat intelligence.
By the end, students will be able to dissect malware and contribute to incident response and threat hunting efforts.
- Identify and analyze various types of malware.
- Use static and dynamic analysis tools effectively.
- Prepare for roles in malware research and digital forensics.
- Build a portfolio of malware analysis reports.