Price: $1,699.00

Length: 2 Days
Print Friendly, PDF & Email

Fundamentals of Malwares And Protection Against Malware Training By TONEX

Fundamentals of Malwares And Protection Against Malware Training Course Description

By increasing number of cybercrimes and cyber-attacks these days, one should anticipate more training in cyber security area to guarantee a cyber-secured network. TONEX as a leader in security industry for more than 15 years has recently released the fundamentals of malwares and protection against malware training.

TONEX has served the industry and academia with high quality conferences, seminars, workshops, and exclusively designed courses in cyber security area and is pleased to inform professional fellows about the recent comprehensive training on protection against malware.

By taking the fundamentals of malwares and protection against malware training, you will learn the definition of computer security and necessity of protection against malwares. Moreover, how risk of attacks in networks is evaluated and what are the steps to ensure the system security against malwares.

Learn about malicious software (Malware), effect of malware on user’s device, and common types of malware in today’s network. This course gives you the sufficient knowledge to classify the malwares based on the risk that they cause on the system security.

Learn about the Trojans and Worm and their different types as a common malwares in cyber security. This course will address the latest recorded types of Trojan horses with their example and common worms in malicious software.

Learn how malwares, exploits and malicious code attacks can harm the cyber security and what procedures should be done to secure the network in case these attacks happen to the system.

After introducing another types of malwares named exploits, this course helps you to understand the different algorithms to detect the malwares, understand the malware criminal activities and perform the anti-malware analysis. Upon the completion of the course, you will be introduced to the advanced malware detection algorithms too.

As the first step after identifying the malware is to prevent the risk caused by their activation, this training will teach you the fundamentals of malware incident prevention, threat mitigation, spyware removal techniques and firewall security actions.

If you are a professional who specialize in managing or designing security solutions and risk based management provider, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of fundamentals of malwares and protection against malware training and will prepare yourself for your career.

Finally, the fundamentals of malwares and protection against malware training will help you to handle the malware in case the prevention algorithm could not mitigate the malware. In this case, malware incident response technique is the best option which will be discussed in detail in the course.


The fundamentals of malwares and protection against malware training is a 2-day course designed for:

  • All individuals who need to understand the concept of malwares and malware protection schemes.
  • IT professionals in the areas of incident response, forensic investigation, windows security and system administration
  • Cyber security professionals, network engineers, security analysts, policy analysts
  • Security operation personnel, network administrators, system integrators and security consultants
  • IT professionals interested in the field of malware based attacks
  • Security traders to understand the malware based attacks.
  • Investors and contractors who plan to make investments in security system industry.
  • Technicians, operators, and maintenance personnel who are or will be working on cyber security projects
  • Managers, accountants, and executives of cyber security industry.

Training Objectives

Upon completion of the fundamentals of malwares and protection against malware training course, the attendees are able to:

  • Understand the foundation and history behind the computer security
  • Explain different types malwares and consequences of malwares to the computer security
  • Understand the different classification of malwares in network security
  • Recognize the different types of Trojans and Worms as the most common types of malwares
  • Describe the exploits and their different types and consequences
  • Explain the malware detection algorithms and approaches
  • Understand the malware prevention studies
  • Describe the incident response methodologies in case of malware attacks

Training Outline

The fundamental of malwares and protection against malware training course consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Computer Security

  • Definition of Computer security
  • Why computer security?
  • Privacy issues
  • Risk of attacks in network
  • Consequences of security violations
  • Computer security policies
  • Control laws in computer security
  • Legal status of privacy
  • Mobile code security
  • Firewalls and network security issues
  • System security
  • Electronic commerce
  • Authentication in computer security
  • Concept of cryptography

Introduction to Malwares

  • Definition of Malware
  • Malicious Software (Malware)
  • Malware effect to user’s device
  • Examples of Malwares
  • Computer virus
  • Boot sector virus
  • Excel micro virus
  • Word micro virus
  • Script viruses
  • Keyloggers
  • Password stealers
  • Backdoor Trojan
  • Crimeware
  • Spyware
  • Adware

Malware Classification

  • Classification based on least threat results
  • Classification based on great threat results
  • Exploits
  • Rootkits
  • Trojans
  • Backdoors
  • Viruses
  • Worms
  • Email Worms
  • Networms

Different Types of Trojans and Worms

  • Trojan Dropper
  • Trojan Downloader
  • Trojan PSV
  • Trojan Spy
  • Trojan DDOS
  • Trojan Ransom
  • Trojan Game Thief
  • Trojan IM
  • Trojan Banker
  • Trojan SMS
  • Trojan Proxy
  • Trojan Arcbomb
  • Trojan Clicker
  • P2P Worm
  • IRC Worm
  • IM Worm

Different Classification of Exploits

  • Categories of exploits
  • Exploits by type of vulnerability
  • Local or remote exploits
  • Results of exploits
  • Pivoting
  • Proxy pivoting
  • VPN pivoting
  • Techniques of gaining Foothold
  • Shell code
  • Integer overflow vulnerabilities
  • Stack-based buffer overflows
  • Stacks upon stacks
  • Crossing the line
  • Protecting against stack-based
  • Buffer overflows
  • Addendum; stack-based buffer
  • Overflow mitigation
  • Format string vulnerabilities
  • SQL injection
  • Protection against SQL injection
  • Malicious PDF files
  • Creating malicious PDF files
  • Reducing the risks of malicious files
  • Web exploit tools
  • Features of hiding
  • Commercial web exploit tool
  • Proliferation of web exploit tools
  • DOS conditions
  • Brute force and dictionary attacks
  • Misdirection method
  • Reconnaissance method
  • Disruption method
  • Cross site scripting (XSS)
  • WarXing
  • DNS amplification attacks
  • Protection over DNS amplification attacks

Malware and Exploit Detection

  • Detecting wide range of existing malicious programs
  • Detecting new modification of known malwares
  • Detecting packaged files
  • Antivirus programs
  • Effective computer protection policy
  • Data security
  • Digital identity security
  • Finances security
  • Frequently updated drivers for all malware types
  • Detecting malware creators
  • Vandals
  • Swindlers
  • Blackmailers
  • Malware criminals
  • Anti-malware technology
  • Security state assessment
  • Anti-Malware analysis
  • Extensive data analysis
  • Rigorous analysis
  • Integrated response
  • Advanced malware detection
  • Streamlined management
  • Challenges regarding anti-malware technologies

Malware Incident Prevention

  • Malware incident policies
  • Awareness
  • Vulnerability mitigation
  • Patch management
  • Least privilege
  • Host hardening measures
  • Threat mitigation
  • Antivirus software
  • Spyware detection and removal utilities
  • Intrusion prevention systems
  • Firewalls and routers
  • Application settings

Malware Incident Response

  • Preparation
  • Maintaining malware related skills
  • Facilitating communications and coordination
  • Acquiring tools and resources
  • Malware detection
  • Signs of malware incidents
  • Malware incident characteristic
  • Prioritizing incident response
  • Containment
  • Containment through user participation
  • Automated detection
  • Disabling connectivity
  • Containment recommendations
  • Identification of infected hosts
  • Eradication
  • Recovery
  • Future of malwares

Malware Static Analysis

  • Checking file signature
  • Malware strings
  • Import and exports
  • Encryption and packing
  • Tools: md5sum, strings, PEView, PEiD, Resource Hacker, Dependency Walker
  • Advanced static analysis

Malware Dynamic Analysis

  • Virtual malware analysis lab
  • Monitoring using process monitor
  • Analyzing the process using process explorer
  • Comparing registry snapshots with Regshot
  • Monitoring malware network traffic
  • Debugging

Hands-on and In-Class Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops Labs for Malware Protection Training

  • Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents
  • Examining static properties of suspicious programs
  • Performing behavioral analysis of malicious Windows executable
  • Analyzing malicious Adobe PDF documents
  • Bypassing anti-analysis defenses
  • Recognizing malware
  • Intercepting network connections in the malware lab
  • Interacting with malicious websites to examine their nature
  • JavaScript analysis complications
  • x86 Intel assembly language primer for malware analysts
  • Patterns of common malware characteristics at the Windows API level (DLL injection, function hooking, keylogging, communicating over HTTP, etc.)


Fundamentals Of Malwares And Protection Against Malware Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.