Dear Members
Network Intelligence - a global cybersecurity firm offering assessments, advisory, consulting, certification & trainings is offering an 18-hour training spread over 4 days titled as "
Certified Threat & Malware Analyst" (
CTMA).
This training is focused on coverage of both Malware Analysis and Threat Hunting & is designed to ensure that all aspects have a real-life scenario-based approach explaining the core steps needed to perform either Malware Analysis or Threat Hunting.
The training details for the ME-based batch are as under
• Date: Jan 17 - Jan 20, 2022
• Time: 6.00 AM – 10.30 AM GMT
• Duration: 4.5 hours every day for 4 days
• Mode: Online
• Cost:
o USD 200/-
o For ISACA Members - USD 150/-The training brochure is attached for ready reference.
Below is the course outline of the training for ready reference.
Certified Threat & Malware Analyst (CTMA) -Training – 4 Days course contents
Session 1: Introduction to Threat Hunting
• Need for Threat Hunting
• Threat Hunting Framework
• Typical Data Sources
• Threat Hunting Maturity Model
• What is a Threat Hunter?
• Threat Hunting Skills
• MITRE ATT&CK
• MITRE CAR
• Current Attacks Case Studies
Session 2: Practical Threat Hunting
• Types of Threat Hunting
• Analysis Techniques used by a Threat Hunter
• Creating Hypothesis
• Understanding Log Sources in an Organization
• Network
• OS
• Solutions
• Hunting on Network log sources
• Firewall
• DNS
• Hunting on OS log Sources
• Windows
• Linux
• Threat Intelligence:
• Threat Intelligence Feeds
• Operationalizing Threat Intelligence
• Metrics for Threat Hunting Success
• Reporting for Threat Hunting
Session 3: Introduction to Malware Analysis
• Types of Malwares
• Skills required by a Malware Analyst
• Levels of Malware Analysis
• Sandboxing
• Online sandboxing
• Setting up a malware analysis lab
• Procedures
• Tools required
• Non malicious vs malicious behavior
• Malware attack case studies
Session 4: Practical Malware Analysis
• Static Analysis of Malware:
• Files and File Formats
• Properties of files
• Content of files
• Malware Funneling
• Behavioral Analysis:
• Analyzing Process Behavior
• System Activity monitoring
• Analyzing network communication and packet captures
• Extracting IOCs to be used for Blocking
• Anti-Analysis techniques of malware
• Analysis of trending malwares
ISACA Riyadh Chapter members willing to take up this training may register on the below link mentioning your Chapter Name:
Registration link: https://forms.office.com/r/icZmPcvfp5Thx and kind regards