This course, founded on concept operations and real cyber capabilities, provides you with the understanding, tools, and processes needed to conduct malware analysis with real-world malicious code samples to dissect. You will prepare and plan an effective offensive and defensive strategy, as well as evaluate covert protocols. Analysis of system specific, nondescript tools will be introduced to aid in attack and defense.
Classes of malware System monitoring Malware analysis tools Socio-technological engineering Forensics and counter-forensics Analysis of kernel level rootkits Network evasion techniques and countermeasures
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.