- 13 courses
- 30 hours
- Skill IQ
In today’s threat landscape, sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. To achieve this, malware authors employ a wide variety of obfuscation and anti-analysis techniques at each phase of an attack. Developing the skills necessary as a malware analyst to properly detect, triage and reverse engineer advanced attacker intrusion tactics and techniques requires experience and a diverse set of tools and skills. In this path you will develop the skills and knowledge necessary to analyze malicious office documents, dig deep into native and interpreted code through disassembly and decompilation, identify and defeat prevalent obfuscation techniques. The courses in this path with take you from malware analysis basics to advanced topics so that you can generate valuable threat intelligence to aid in your efforts to defend your organization, respond more effectively to an incident or gain deeper understanding of the latest malware threats.
This skills path may assist in attaining the knowledge and skills outlined in the NICE Cybersecurity Workforce Framework in the following areas: K0259 & K0479 Knowledge of malware analysis concepts and methodologies. S0131 Skill in analyzing malware.
Courses in this path
In this section, you will be introduced to the key concepts associated with performing malware analysis. You will learn how malicious actors attack organizations, users and endpoints and how you can begin to analyze the artifacts associated with these attacks. Finally, you will apply everything you have learned to begin to develop a workflow for performing malware analysis, identifying key indicators of compromise and the ability to create a narrative around an incident.
In this section, you will learn how to leverage many industry standard tools for analyzing and reverse engineering malware. You will gain a deeper understanding of reverse engineering and how to apply those skills to analyzing malware. You will also explore many prevalent obfuscation techniques used by malware authors to disrupt detection and analysis and develop effective strategies for identifying and defeating those techniques.
In this section, you will learn how malware authors can employ anti-analysis techniques to trick your analysis tools. These techniques, when successful, can be used to bypass your analysis workflow and are vital as a malware analyst to identify. You will also continue to explore the inner workings of sophisticated malware to learn how it works and how you can effectively unravel it.