Master Class: Advanced Malware Hunting & Prevention (AMH)

 

Course Overview

This course teaches the ways of identifying how malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium-sized enterprises and organizations.

All exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!

Who should attend

Security architects, Active Directory administrators, security administrators, security auditors, and other people responsible for implementing secure identity. To attend this training, attendees should have a good hands-on experience with Active Directory Domain Services (AD DS) administration.

Course Objectives

During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening – you will implement security in depth solutions, such as whitelisting or virtualization, in order to protect assets.

Course Content

Module 1: What is Malware
  • Malware history
  • Malware goals
  • Types of malware
  • Advanced persistent threats
  • Indicators of compromise
Module 2: Introduction to Malware Analysis
  • Types of malware analysis
  • Goals of malware analysis
  • Impact analysis
  • Containment and mitigation
  • Incident prevention and response playbooks
  • Setting up sandbox environment
  • Cloud-based malware analysis
Module 3: Static Malware Analysis
  • Executable analysis
  • Extracting secrets
  • Determining if file is packed or obfuscated
  • Fingerprinting the malware
  • Pattern matching using YARA
Module 4: Behavioral Malware Analysis
  • Malware detonation
  • Sysinternals suite
  • Network communication analysis
  • Monitoring system events
  • Memory dump analysis
  • Simulating real environment
Module 5: Malicious non-exe Files
  • Alternative binaries
  • PowerShell scripts
  • Office documents
  • JScript
  • HTML documents
  • Living off the land binaries
Module 6: Advanced Techniques used by Malware
  • Malware persistence methods
  • Malware stealth techniques
  • Covert channel communication
  • Domain Generator Algorithms
  • Anti-VM and Anti-debugging tricks
Module 7: Defense Against Malware
  • Types of defenses against malware
  • Antivirus and antimalware solutions and bypass techniques
  • AI and ML in security
  • Exploit guard
  • Overview of whitelisting solutions in security
  • Leveraging Microsoft Defender XDR
  • Usage of SIEM solutions and building rules and workflows
Module 8: Implementing Network Whitelisting
  • IPS and IDS solutions in fight against malware
  • Firewall and analysis of incoming traffic
  • Windows blocking outgoing traffic as countermeasure for malware home calling
  • Increasing network security with 802.1X
Module 9: Implementing Application Whitelisting
  • Software restriction policy – bad or good?
  • Applocker – secure way of whitelisting application
  • Device guard security in fight against malware
Module 10: Implementing and Maintaining Whitelisting on the Enterprise Scale
  • Working with application identity
  • Code signing in application whitelisting
  • Application reputation filters
  • Planning and implementing application whitelisting in enterprise without paralyzing business

Preise & Trainingsmethoden

Online Training

Dauer
5 Tage

Preis
  • 3.500,– €

Derzeit gibt es keine Trainingstermine für diesen Kurs.