What You Need to Know Before
You Start
Starts 10 June 2025 01:30
Ends 10 June 2025
00
days
00
hours
00
minutes
00
seconds
43 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore malware mitigation techniques, including sample detonation and intelligence automation, to enhance cybersecurity defenses and streamline incident response workflows.
Syllabus
- Introduction to Malware Mitigation
- Sample Detonation Techniques
- Malware Intelligence Automation
- Enhancing Cybersecurity Defenses
- Streamlining Incident Response Workflows
- Tools and Technologies
- Hands-on Labs and Workshops
- Case Studies and Real-world Applications
- Course Review and Final Assessment
Overview of Malware Types and Behaviors
Importance of Malware Mitigation
Understanding Sample Detonation
Tools and Environments for Detonation
Analyzing Detonation Results
Introduction to Intelligence Automation
Integrating Intelligence into Cybersecurity Workflows
Automatic Threat Intelligence Gathering
Best Practices for Threat Detection and Prevention
Leveraging Threat Intelligence for Improved Security
Incident Response Optimization
Creating Efficient Incident Response Processes
Automating Key Response Tasks
Case Studies on Incident Response Automation
Overview of Popular Malware Analysis Tools
Automation Platforms and Integration
Leveraging AI and Machine Learning in Mitigation
Conducting Guided Sample Detonations
Building Simple Automation Scripts
Real-world Application of Intelligence Gathering
Analyzing Real-world Attacks and Responses
Lessons Learned from Recent Cyber Threats
Review of Key Concepts
Final Project Presentation or Exam
Subjects
Conference Talks