ME Click here for Course Outline
Malware authors use code pattern changes utilizing polymorphic and metamorphic engines as well as
executable packer and wrapper technologies to evade detection, analysis and attribution. This has led the
security industry away from maintaining vast signature databases into newer defence technologies such as behaviour blocking, application white listing and others.
The threat malware poses is evident by continual increases in four key malware attributes: frequency of
incidents, speed of propagation, damage done or intended and the universality of the impact. Malware
affects us all. This course teaches participants how to categorize, detect, analyze and remedy malware
If you want to learn about malware, you should take this course. Past participants were forensic
investigators, incident responders, system administrators, penetration testers, security engineers, malware
analysts, vulnerability researchers and IT professionals in security that want to understand how to defend
against the threat of malicious code.
Participants must be familiar with common security concepts and basic programming. This workshop caters
to those with no previous experience in malware analysis. During this course, participants will explore basic
malware analysis techniques that even those with only a little security or programming experience will be
able to perform malware triage. Those with more security and programming knowledge will benefit most
from the advanced materials covered in this course. As more advanced topics are introduced, participants
will increase their knowledge, skills and ability to deal effectively with malware. Regardless of your background
or experience with malware analysis, you'll find something useful in this course..
NetRunner Training Center at Dare Corporate Center275 Slater StreetSuite 900Ottawa, Ontario K1P 5H9613-748-6222
For assistance please call (613) 748-6222 or e-mail Valerie Yersh, at email@example.com