What You Need to Know Before
You Start
Starts 9 June 2025 21:41
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
56 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore techniques for comparing malicious files, including sample identification, shared engines, and various metadata analysis methods to enhance threat detection and incident response.
Syllabus
- Introduction to Malicious File Comparison
- Sample Identification Techniques
- Shared Engines for File Analysis
- Metadata Analysis Methods
- Techniques for Enhanced Threat Detection
- Incident Response and Remediation
- Case Studies and Practical Exercises
- Emerging Trends and Future Outlook
- Conclusion and Further Resources
Overview of malware types and characteristics
Importance of file comparison in cybersecurity
Hash-based identification
Signature-based detection
Anomaly detection methods
Overview of shared analysis engines
Use of sandboxes in file analysis
Advantages and limitations of shared engines
Static file metadata examination
Dynamic behavior analysis
Use of YARA rules for metadata detection
Heuristic and behavior-based analysis
Machine learning models for malware classification
Utilizing threat intelligence feeds in detection
Steps for effective incident response
Using comparative analysis for remediation
Post-incident file analysis and reporting
Real-world examples of malicious file comparison
Hands-on labs with tools for file analysis
Advances in malware detection technologies
The role of AI and automation in file comparison
Summary of key concepts
Recommended reading and tools for advanced study
Subjects
Conference Talks