What You Need to Know Before
You Start
Starts 9 June 2025 16:01
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
45 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore automated malware analysis techniques for threat intelligence, including kill chain concepts, Python coding, and C2 clustering to enhance cybersecurity defenses.
Syllabus
- Introduction to Automated Malware Analysis
- Cyber Kill Chain Concepts
- Fundamentals of Python for Cybersecurity
- Techniques for Automated Malware Analysis
- C2 (Command and Control) Clustering
- Enhancing Cybersecurity Defenses through Automation
- Practical Workshop: Automating a Malware Analysis Task
- Ethical Considerations and Best Practices
- Future Trends in Automated Malware Analysis
- Course Review and Q&A Session
Overview of Malware Threats and Impact
Importance of Automation in Threat Intelligence
Understanding the Kill Chain Framework
Applying the Kill Chain to Malware Analysis
Basic Python Programming
Tools and Libraries for Malware Analysis (e.g., Scapy, Volatility)
Static Analysis Automation
File Signature and Hashing
Decompiling and Disassembling
Dynamic Analysis Automation
Sandboxing and Behavior Analysis
Memory Analysis Techniques
Understanding C2 Infrastructure
Automated Detection and Clustering of C2 Activities
Integration of Automated Analysis into Security Operations
Case Studies of Automated Threat Intelligence in Real-World Scenarios
Setting Up a Lab Environment
Implementing a Basic Automated Analysis Pipeline
Legal Implications of Malware Analysis
Responsible Disclosure and Ethical Hacking
AI and Machine Learning in Malware Detection
Emerging Tools and Techniques
Summary of Key Concepts
Open Forum for Discussion and Clarifying Doubts
Subjects
Conference Talks