0122 8899900
Info@example.com
219 Amara Fort Apt. 394
New York, NY 941
8:00AM - 6:00PM
Monday to Saturday
Online 24/7
+122 123 4567
Course Banner
Original Price
₦10,000.00
Discounted Price
₦10,000.00
Ratings

4.0 ( reviews)

Duration

8 Weeks

Training Type
Iure
Technologies
IDA Pro, Ghidra, Cuckoo Sandbox, PEiD, Sysinternals, Wireshark

Participants should have intermediate knowledge of operating systems and cybersecurity. Familiarity with scripting and file systems is recommended.

A laptop with access to sandbox environments and malware analysis tools is essential.

This course is ideal for security analysts, forensic investigators, and malware researchers.

The course explores static and dynamic malware analysis techniques:

  1. Malware Types: Trojans, ransomware, worms, and fileless malware.
  2. Static Analysis: File inspection, strings, and disassembly.
  3. Dynamic Analysis: Behavior monitoring, sandboxing, and debugging.
  4. Reverse Engineering: Tools and techniques for code analysis.
  5. Reporting: Documentation, IOC extraction, and threat attribution.

Modules are designed to build malware detection and analysis skills:

  • Weekly labs on malware samples and sandbox testing.
  • Mini-projects focused on reverse engineering and IOC generation.
  • Peer reviews and malware classification exercises.
  • Capstone project: Analyze a malware sample and produce a detailed report.

Classes are held twice weekly:

  • One lecture session covering malware theory and case studies.
  • One lab session for hands-on analysis and reporting.
  • Optional office hours for mentoring and tool support.

This course teaches how to analyze and understand malicious software. It emphasizes safe handling, reverse engineering, and threat intelligence.

By the end, students will be able to dissect malware and contribute to incident response and threat hunting efforts.

  • Identify and analyze various types of malware.
  • Use static and dynamic analysis tools effectively.
  • Prepare for roles in malware research and digital forensics.
  • Build a portfolio of malware analysis reports.

We run all kinds of IT services that vow your success