Price: $1,699.00

Length: 2 Days
Print Friendly, PDF & Email

Fundamentals of Malwares And Protection Against Malware Training

Malware is everywhere. You can think of it as any software intentionally designed to cause damage to a computer, server, client or computer network.

A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software and scareware. In 2019, a malware attack cost businesses an average of $2.6 million per attack.

You can think of malware as an insidious disease that invades your IT/data system and spreads, eventually shutting down the operability of its host.

Malware can be created by teams of hackers looking to make money by spreading the malware themselves or selling it to the highest bidder on the Dark Web. But there are other reasons for creating malware. For example, it can be used as a tool for protest, a way to test security, or even as weapons of war between governments.

Normally, malware exploits security defects (security bugs or vulnerabilities) in the design of the operating systems, applications or in vulnerable versions of browser plugins. It’s very sneaky about entering your PC. It can enter as the result of clicking on website links, pop-up ads, or any other kind of normal surfing activity. There are subtle and blatant signs that will tell you if it has entered your PC, including:

  • You start seeing an excessive amount of pop-up ads
  • Your PC’s operating system slows down significantly
  • The homepage you have set in your browser is altered
  • When you try to access a webpage in your favorites list, another webpage appears
  • Your computer completely crashes

For the past several years, a sizable portion of malware has been utilizing a combination of many techniques designed to avoid detection and analysis. This type of malware is called evasion malware.

Common characteristics include evasion of analysis and detection by fingerprinting the environment when executed. This malware can also confuse automated tools’ detection methods. This allows malware to avoid detection by technologies such as signature-based anti-virus software by changing the server used by the malware.

There’s also timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time.

Evasion malware can also obfuscate internal data so that automated tools do not detect the malware. One technique that has grown in popularity among cybercriminals is the use of adware, which uses stolen certificates to disable anti-malware and virus protection.

And yet another evasion technique is fileless malware or Advanced Volatile Threats (AVTs). Fileless malware does not require a file to operate. It runs within memory and utilizes existing system tools to carry out malicious acts. Because there are no files on the system, there are no executable files for anti-virus and forensic tools to analyze, making such malware nearly impossible to detect.

Fundamentals of Malwares And Protection Against Malware Training course By Tonex

By taking the fundamentals of malwares and protection against malware training, you will learn the definition of computer security and necessity of protection against malwares. Moreover, participants learn how risk of attacks in networks is evaluated and what are the steps to ensure the system security against malwares.

Learn about malicious software (malware), effect of malware on user’s device, and common types of malware in today’s network. This course gives you sufficient knowledge to classify the malwares based on the risk that they cause on system security.

Learn about Trojans and Worm as common malwares in cybersecurity. This course will address the latest recorded types of Trojan horses with examples and common worms in malicious software.

Learn how malwares, exploits and malicious code attacks can harm cybersecurity and what procedures should be done to secure the network in case these attacks happen to the system.

After introducing other types of malwares named exploits, this course helps you to understand the different algorithms to detect the malwares, understand the malware criminal activities and perform the anti-malware analysis. Upon the completion of the course, you will be introduced to the advanced malware detection algorithms too.

As the first step after identifying the malware is to prevent the risk caused by their activation, this training will teach you the fundamentals of malware incident prevention, threat mitigation, spyware removal techniques and firewall security actions.

If you are a professional who specialize in managing or designing security solutions and risk based management provider, you will benefit from the presentations, examples, case studies, discussions, and individual activities upon the completion of fundamentals of malwares and protection against malware training to help prepare yourself for your career.

Finally, the fundamentals of malwares and protection against malware training will help you to handle the malware in case the prevention algorithm could not mitigate the malware. In this case, malware incident response technique is the best option which will be discussed in detail in the course.

Audience

The Fundamentals of Malwares and Protection Against Malware training is a 2-day course designed for:

  • All individuals who need to understand the concept of malwares and malware protection schemes
  • IT professionals in the areas of incident response, forensic investigation, windows security and system administration
  • Cybersecurity professionals, network engineers, security analysts, policy analysts
  • Security operation personnel, network administrators, system integrators and security consultants
  • IT professionals interested in the field of malware-based attacks
  • Security traders who need to understand malware-based attacks
  • Investors and contractors who plan to make investments in security system industry
  • Technicians, operators, and maintenance personnel who are or will be working on cybersecurity projects
  • Managers, accountants, and executives in the cybersecurity industry

Training Objectives

Upon completion of the Fundamentals of Malwares and Protection Against Malware Training course, the attendees are able to:

  • Understand the foundation and history behind the computer security
  • Explain different types malwares and consequences of malwares to computer security
  • Understand the different classification of malwares in network security
  • Recognize the different types of Trojans and Worms as the most common types of malwares
  • Describe the exploits and their different types and consequences
  • Explain the malware detection algorithms and approaches
  • Understand the malware prevention studies
  • Describe the incident response methodologies in case of malware attacks

Training Outline

The fundamental of malwares and protection against malware training course consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Computer Security

  • Definition of Computer security
  • Why computer security?
  • Privacy issues
  • Risk of attacks in network
  • Consequences of security violations
  • Computer security policies
  • Control laws in computer security
  • Legal status of privacy
  • Mobile code security
  • Firewalls and network security issues
  • System security
  • Electronic commerce
  • Authentication in computer security
  • Concept of cryptography

Introduction to Malwares

  • Definition of Malware
  • Malicious Software (Malware)
  • Malware effect to user’s device
  • Examples of Malwares
  • Computer virus
  • Boot sector virus
  • Excel micro virus
  • Word micro virus
  • Script viruses
  • Keyloggers
  • Password stealers
  • Backdoor Trojan
  • Crimeware
  • Spyware
  • Adware

Malware Classification

  • Classification based on least threat results
  • Classification based on great threat results
  • Exploits
  • Rootkits
  • Trojans
  • Backdoors
  • Viruses
  • Worms
  • Email Worms
  • Networms

Different Types of Trojans and Worms

  • Trojan Dropper
  • Trojan Downloader
  • Trojan PSV
  • Trojan Spy
  • Trojan DDOS
  • Trojan Ransom
  • Trojan Game Thief
  • Trojan IM
  • Trojan Banker
  • Trojan SMS
  • Trojan Proxy
  • Trojan Arcbomb
  • Trojan Clicker
  • P2P Worm
  • IRC Worm
  • IM Worm

Different Classification of Exploits

  • Categories of exploits
  • Exploits by type of vulnerability
  • Local or remote exploits
  • Results of exploits
  • Pivoting
  • Proxy pivoting
  • VPN pivoting
  • Techniques of gaining Foothold
  • Shell code
  • Integer overflow vulnerabilities
  • Stack-based buffer overflows
  • Stacks upon stacks
  • Crossing the line
  • Protecting against stack-based
  • Buffer overflows
  • Addendum; stack-based buffer
  • Overflow mitigation
  • Format string vulnerabilities
  • SQL injection
  • Protection against SQL injection
  • Malicious PDF files
  • Creating malicious PDF files
  • Reducing the risks of malicious files
  • Web exploit tools
  • Features of hiding
  • Commercial web exploit tool
  • Proliferation of web exploit tools
  • DOS conditions
  • Brute force and dictionary attacks
  • Misdirection method
  • Reconnaissance method
  • Disruption method
  • Cross site scripting (XSS)
  • WarXing
  • DNS amplification attacks
  • Protection over DNS amplification attacks

Malware and Exploit Detection

  • Detecting wide range of existing malicious programs
  • Detecting new modification of known malwares
  • Detecting packaged files
  • Antivirus programs
  • Effective computer protection policy
  • Data security
  • Digital identity security
  • Finances security
  • Frequently updated drivers for all malware types
  • Detecting malware creators
  • Vandals
  • Swindlers
  • Blackmailers
  • Malware criminals
  • Anti-malware technology
  • Security state assessment
  • Anti-Malware analysis
  • Extensive data analysis
  • Rigorous analysis
  • Integrated response
  • Advanced malware detection
  • Streamlined management
  • Challenges regarding anti-malware technologies

Malware Incident Prevention

  • Malware incident policies
  • Awareness
  • Vulnerability mitigation
  • Patch management
  • Least privilege
  • Host hardening measures
  • Threat mitigation
  • Antivirus software
  • Spyware detection and removal utilities
  • Intrusion prevention systems
  • Firewalls and routers
  • Application settings

Malware Incident Response

  • Preparation
  • Maintaining malware related skills
  • Facilitating communications and coordination
  • Acquiring tools and resources
  • Malware detection
  • Signs of malware incidents
  • Malware incident characteristic
  • Prioritizing incident response
  • Containment
  • Containment through user participation
  • Automated detection
  • Disabling connectivity
  • Containment recommendations
  • Identification of infected hosts
  • Eradication
  • Recovery
  • Future of malwares

Malware Static Analysis

  • Checking file signature
  • Malware strings
  • Import and exports
  • Encryption and packing
  • Tools: md5sum, strings, PEView, PEiD, Resource Hacker, Dependency Walker
  • Advanced static analysis

Malware Dynamic Analysis

  • Virtual malware analysis lab
  • Monitoring using process monitor
  • Analyzing the process using process explorer
  • Comparing registry snapshots with Regshot
  • Monitoring malware network traffic
  • Debugging

Hands-on and In-Class Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops Labs for Malware Protection Training

  • Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents
  • Examining static properties of suspicious programs
  • Performing behavioral analysis of malicious Windows executable
  • Analyzing malicious Adobe PDF documents
  • Bypassing anti-analysis defenses
  • Recognizing malware
  • Intercepting network connections in the malware lab
  • Interacting with malicious websites to examine their nature
  • JavaScript analysis complications
  • x86 Intel assembly language primer for malware analysts
  • Patterns of common malware characteristics at the Windows API level (DLL injection, function hooking, keylogging, communicating over HTTP, etc.)

 

Fundamentals Of Malwares And Protection Against Malware Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.