
You'll also learn how to examine shellcode. The course will also teach you how to deobfuscate malicious scripts in the form of JavaScript and PowerShell scripts. You'll learn how to examine macros and other threats that such documents might pose. Next, you will dive the analysis of malicious Microsoft Office, RTF, and PDF document files, which are often used as part of the attack chain in mainstream and targeted attacks. In addition, you will learn to identify common malware characteristics by looking at suspicious Windows API patterns employed by malicious programs. You will learn to examine malicious code with the help of a disassembler and a decompiler to understand key capabilities and execution flow. The course continues by discussing essential assembly language concepts relevant to reverse engineering. You will also start mastering dynamic code analysis techniques with the help of a debugger. You will also learn how to redirect and intercept network traffic in the lab to derive additional insights and indicators of compromise. You will learn how to set up a flexible laboratory to examine the inner workings of malicious software, and how to use the lab to uncover characteristics of real-world malware samples. The course begins malware analysis essentials that let you go beyond the findings of automated analysis tools. This course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and many other freely available tools. Understanding the capabilities of malware is critical to your ability to derive threat intelligence, respond to cybersecurity incidents, and fortify enterprise defenses. FOR610 training has helped forensic investigators, incident responders, security engineers, and threat analysts acquire the practical skills to examine malicious programs that target and infect Windows systems. Learn to turn malware inside out! This popular reversing course explores malware analysis tools and techniques in depth. Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
