Module 1: What is malware
Module 2: Introduction to Malware Analysis
Module 3: Static malware analysis
Module 4: Behavioral malware analysis
Module 5: Malicious non-exe files
Module 6: Advanced techniques used by malware
Module 7: Defending against malware
Attendees should meet the following prerequisites:
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5-8 years in the field is recommended.
Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
To attend this training, you should have a good hands-on experience in administering Windows infrastructure. At least 5-8 years in the field is recommended.
NOK 45.000
COURSE CONTENT: โข Course introduction โข Unit 1: Controlling process flow โข Exercise 1: Controlling process flow โข Unit 2: Controlling process flow with business data โข Exercise 2:…
COURSE CONTENT: Topics โข Course introduction โข Unit 1. Introduction to IBM Cloud Pak for Business Automation โข Unit 2. Installing Cloud Pak for Business Automation โข Unit 3….
COURSE CONTENT: Module 1: Hacking SQL Server Infrastructure โข Discovering SQL Server instances โข SQL injection using men in the middle โข Capturing SQL credentials using men in the…