Understanding and Managing the threat of Malware

3 Day Course
Hands On
Code QAMAL

This course has been retired. Please view currently available Information Security Training Courses.

Modules

Hide all

Types of Malware (5 topics)

  • Trojans
  • Adware
  • Spyware
  • Rootkits
  • Multi-stage attacks

Rootkits (3 topics)

  • Function
  • Infection and concealment mechanisms
  • Common rootkits

Exercise: Using a rootkit (1 topic)

  • Performing an 'evil maid' attack

Trojans (4 topics)

  • Infection mechanisms
  • Multi-stage attacks
  • Common Trojans
  • Multi-stage attacks

Exercise: Infecting a client (2 topics)

  • Malware configuration
  • Creating an infected webpage

Botnets (5 topics)

  • Types of botnets
  • Command & Control strategies
  • Obfuscation techniques
  • The Storm botnet
  • The Koobface botnet

Exercise: Botnets (2 topics)

  • Joining a botnet
  • Analysing botnet traffic

Commercial malware creation (4 topics)

  • Who creates malware
  • Common commercial strategies
  • The Mpack kit
  • Modern kits

Exercise: Malware creation kits (2 topics)

  • Exploring the Mpack kit
  • Infecting a web server

Malware Detection & Removal (2 topics)

  • Common tools
  • Manual cleaning

Exercise: Cleaning Infected Computers (2 topics)

  • Automated tools
  • Manual cleaning

Prerequisites

The prerequisites for this workshop are attendance of the Security Fundamentals course, or equivalent knowledge.

Course PDF

Print

Sections