• Office Location HCJM+44 Muscat
  • Email info@aca.om
  • Phone +968 24990900 | +968 24990901

Cybersecurity – Malware Analysis & Reverse Engineering

Today's world is populated by malware of all kinds. Their impacts on our information systems can be catastrophic, so it is necessary to know how to detect, identify, and eradicate them. The training “Malware Analysis" is the essential step to the training of a CyberSecurity Expert. The purpose of this training is to have a good knowledge on malware (x86) : types, mechanisms, functions, information to extract. While understanding and manipulating the concepts and tools leading to threat intelligence.

Overview

The many practical exercises are performed on the CYBELS Range training platform virtualizing information systems representative of current network architectures.
Each trainee has at his disposal a Linux PC and his own information system on CYBELS Range.
It can connect to many devices (PCs, servers, WAF, mobile devices ...).
The training also brings a RETEX in cybersecurity on Thales tools, equipment, projects and solutions

Goals

After the course, the students know :

  • The differences between Malwares
  • How to detect and identify a Malware
  • How to analyze a Malware, know how it works, and create rules for detection
  • Ability to analyze shellcode
  • Understanding of software exploits
  • Ability to analyze packed and obfuscated code

Course Content

Basics (x86)
  • Assembler (x86)
  • Reverse Engineering basics
  • How to build your own toolbox
    • Gdb
    • Radare2
    • IDA Pro
    • Sandboxing
  • OSINT Malware (Threat Intel)
    • Detection
    • Rules
Reverse Engineering, how to proceed
  • Knowledgeable in the use of:
    • IDA Pro disassembler
    • User- and kernel-mode debuggers
    • Common binary file formats
    • Dynamic analysis tools
    • Network analysis tools
  • Static & Dynamic Analysis
  • Packers
    • Msfvenom
    • Upx
    • Veil-evasion
    • Empire
  • Crypto
  • Anti debugger / Anti VM
  • C & C ( Command & Control)

Schedule

Assessment

Prerequisites

This course is dedicated to people who are
familiar with :
  • IP Network and TCP / IP protocols
  • System x86 basics
  • Development basics
  • Strong programming skills
  • Assembler basics
  • CyberSecurity & Forensics basics
  • Threat Intel basics


Recommended Prerequisites Courses



Complement Courses



Organization

  • 5 training days
  • Several hands-on exercises : 60 % Theory / 40 % Practice
  • 8 students maximum per session
  • Intermediate level


Location

ACA Main Building

Contacts

PO Box 74, Al-Khuwair
PC 133, Sultanate of Oman
+968 24990900 | +968 24990901