HR Services

About the course

Our course caters this need in giving an enriched and contextual journey and experience in this field of Cyber Security. Staffed by the most reputed and seasoned professionals in the cyber security industry, we will ensure that all the attendees armour the best knowledge and enhance their extensive skills in this space.

Problem Statement

The advent of new technologies and solutions and their essence have given an immense scope for threat actors for infiltration, exfiltration and obliteration. The threat actors constantly update their Techniques Tools and Procedures (TTP) to stay under the radar. The rise of Advanced Persistent Threat (APT), Zero days powered with evasion and lateral propagation has given an increased attention to the Cyber security arena. This ensures that no system is safe and no solution is secure without proper defensive and validation mechanism.

Due to this increased attention, the demand and the need of cyber security has increased. The security industry is on a constant hunt of Cyber security professionals who are passionate of creating and providing defensive solutions and ensuring proactive solutions is in place.

Our course caters this need in giving an enriched and contextual journey and experience in this field of Cyber Security. Staffed by the most reputed and seasoned professionals in the cyber security industry, we will ensure that all the attendees armour the best knowledge and enhance their extensive skills in this space.

Our dedicated team have got a strong and reputed record of providing the best results in the security architecture implementation and getting teams to operational status from scratch

Requirements

  • Analysis machine with VM images XP and windows 7 ( 32 and 64 bit )
  • Dedicated leased line network for malware analysis
  • VPN
  • Virustotal Malware Intelligence service

Course Duration

10 days ( 2 weeks ) with a total of 60 hours

  • Phase 1 - 6 hrs / day * 3 = 18 hrs
  • Phase 2 - 6 hrs / day * 4 = 24 hrs
  • Final Phase - 6 hrs / day * 3 = 18 hrs

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Trainers - Profile

Passionate Security Researchers with an innate interest in Advanced Persistent Threats ( APT ) and the keeping track on the latest trends in the security industry

Skill set of trainers include, Security Research, Malware Reverse Engineering, Vulnerability Research, Mobile threats, Advanced threats, Anomaly/Network Infection detection.

Training Course

Unlike all training sessions we follow a crystal clear approach for the training course. Since we are very serious about the results and ensuring the attendees grasp the best skills we follow these steps

  • Start to understand the expertise of the candidate after initial screening
  • Provide a report to the technical team
  • Technical team decides the working hours needed to train the attendees
  • Training module Phase 1
  • Vetting the candidate on the potential of digesting the Phase 1
  • Training module Phase 2
  • Vetting the candidate on the potential of digesting the Phase 2
  • Final Training Phase → Production ready
Training Module Phase 1
  • Threat Intelligence
  • API’s
  • Assembly language
  • Identifying IOC’s
  • Knowledge and usage of Analysis tools
  • Knowledge on compilers, packers, and file structures
  • Anomalies and heuristics
  • Debugging Skills - Compiler code, User code, Dead code
Training Module Phase 2
  • Static Analysis deep dive
  • Packers and Unpacking
  • Evasive techniques
  • Crypters and Fully Undetectable (FUD) binary analysis
  • Static Classification of malware families
  • Relate dynamic analysis to backtrack the static analysis
  • Improving the static skills to into creating a detection logic and ideal signature
  • Walkthrough on generic static detection logics ( Compiler code, User code )
Final Training Module
  • Techniques and procedures that aid faster, reliable static analysis
  • Identifying potential malware code for adding a generic signature
  • Obfuscation, Encryption and signature evading methods
  • Clustering methods for malwares
  • Techniques that can aid in avoiding False positives in static signature
  • Identifying a root cause for a False positive in static signature
  • Malware Analysis reports ( Static and Dynamic )
  • Non PE and Non windows malware analysis and static detection

What will the attendees learn after this course

  • Deep analysis of malwares/threats
  • Threats which can evade automated systems
  • Tracking relationships between active threat actors
  • Creating detection logics for all the latest threats, APT (Advanced Persistent threats) and malwares with media attention
  • Detection - IOC (Indicators of Compromise), Antivirus Signatures, Detection routines, Anomalies, Heuristics, Packet analysis, clustering
  • Threat Intel - Evolution, Targets, threat actor

Tenure

  • Phase 1 - 12 hours
  • Phase 2 - 14 hours
  • Final phase - 9 hours

Pricing

The cost of this course will be 50,000 INR + GST