Chapter Member Discount on Certified Threat & Malware Analyst (CTMA) Training by NII

Starts:  Jan 17, 2022 09:00 (AT)
Ends:  Jan 20, 2022 12:30 (AT)
Dear Members

Network Intelligence - a global cybersecurity firm offering assessments, advisory, consulting, certification & trainings is offering an 18-hour training spread over 4 days titled as "Certified Threat & Malware Analyst" (CTMA).

This training is focused on coverage of both Malware Analysis and Threat Hunting & is designed to ensure that all aspects have a real-life scenario-based approach explaining the core steps needed to perform either Malware Analysis or Threat Hunting.

The training details for the ME-based batch are as under
• Date: Jan 17 - Jan 20, 2022
• Time: 6.00 AM – 10.30 AM GMT
• Duration: 4.5 hours every day for 4 days
• Mode: Online
• Cost:
o USD 200/-
o For ISACA Members - USD 150/-

The training brochure is attached for ready reference.
Below is the course outline of the training for ready reference.

Certified Threat & Malware Analyst (CTMA) -Training – 4 Days course contents

Session 1: Introduction to Threat Hunting
• Need for Threat Hunting
• Threat Hunting Framework
• Typical Data Sources
• Threat Hunting Maturity Model
• What is a Threat Hunter?
• Threat Hunting Skills
• MITRE ATT&CK
• MITRE CAR
• Current Attacks Case Studies

Session 2: Practical Threat Hunting
• Types of Threat Hunting
• Analysis Techniques used by a Threat Hunter
• Creating Hypothesis
• Understanding Log Sources in an Organization
• Network
• OS
• Solutions
• Hunting on Network log sources
• Firewall
• DNS
• Hunting on OS log Sources
• Windows
• Linux
• Threat Intelligence:
• Threat Intelligence Feeds
• Operationalizing Threat Intelligence
• Metrics for Threat Hunting Success
• Reporting for Threat Hunting

Session 3: Introduction to Malware Analysis
• Types of Malwares
• Skills required by a Malware Analyst
• Levels of Malware Analysis
• Sandboxing
• Online sandboxing
• Setting up a malware analysis lab
• Procedures
• Tools required
• Non malicious vs malicious behavior
• Malware attack case studies

Session 4: Practical Malware Analysis
• Static Analysis of Malware:
• Files and File Formats
• Properties of files
• Content of files
• Malware Funneling
• Behavioral Analysis:
• Analyzing Process Behavior
• System Activity monitoring
• Analyzing network communication and packet captures
• Extracting IOCs to be used for Blocking
• Anti-Analysis techniques of malware
• Analysis of trending malwares

ISACA Riyadh Chapter members willing to take up this training may register on the below link mentioning your Chapter Name:

Registration link: https://forms.office.com/r/icZmPcvfp5

Thx and kind regards









Location

Saudi Arabia
Online Instructions:
Url: http://forms.office.com/r/icZmPcvfp5
Login: To be provided upon registration
Event Image

Contact

Hasnain Jaffery

hasnain_jaffery@yahoo.com