{"593720":{"#nid":"593720","#data":{"type":"event","title":"Open-Enrollment Course: \u0022Introduction to Malware Analysis\u0022","body":[{"value":"\u003Cp\u003EMalware is a growing threat to the information and intellectual property of organizations as techniques from attackers become increasingly sophisticated. This course will provide a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact. Discussions and hands-on exercises will demonstrate malware analysis processes and their complexities as well as illustrate how to appropriately size, design, and build an analytical capability best suited for your organization. Participants will prepare an analysis test-bed and analyze multiple malware samples. Think like a Black Hat, exploring advanced techniques and tools, including data exfiltration and stealthy operation, to understand the tactics of malware authors.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/pe.gatech.edu\/courses\/introduction-malware-analysis\u0022\u003Ehttps:\/\/pe.gatech.edu\/courses\/introduction-malware-analysis\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003E\u0026nbsp;\u003C\/h2\u003E\r\n\r\n\u003Ch2\u003EWho Should Attend\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cp\u003EInformation assurance officers (IAOs) and managers (IAMs), information security professionals charged with threat detection and incident response, and IT professionals seeking a greater understanding of potential malware threats and exploitation techniques\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003E\u0026nbsp;\u003C\/h2\u003E\r\n\r\n\u003Ch2\u003EHow You Will Benefit\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EDevelop foundational knowledge of malicious software, its forms, traits, author motivations, and impacts.\u003C\/li\u003E\r\n\t\u003Cli\u003EIdentify, discuss, and practice sound malware analysis processes\u003C\/li\u003E\r\n\t\u003Cli\u003EConduct your own analysis on multiple malware samples using state-of-the-art tools.\u003C\/li\u003E\r\n\t\u003Cli\u003EDetermine how to build an analytical capability to fit your organization, considering resource limitation and best practices.\u003C\/li\u003E\r\n\t\u003Cli\u003EDiscover Black Hat exploitation techniques and why they are difficult to detect \u0026ndash; think like a malware author to better anticipate their actions.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003E\u0026nbsp;\u003C\/h2\u003E\r\n\r\n\u003Ch2\u003EContent\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EMalware Overview; Creating an Analysis Environment\u003C\/li\u003E\r\n\t\u003Cli\u003EStatic Analysis\u003C\/li\u003E\r\n\t\u003Cli\u003EDynamic Analysis\u003C\/li\u003E\r\n\t\u003Cli\u003EMalware Analysis Lab\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EEarn credits toward a cybersecurity certificate from \u003Cstrong\u003EGeorgia Tech Professional Education \u003C\/strong\u003Ewith this two-day course. Malware is a growing threat to the information and intellectual property of organizations as techniques from attackers become increasingly sophisticated. This course will provide a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this two-day course."}],"uid":"27490","created_gmt":"2017-07-25 13:58:06","changed_gmt":"2017-07-25 13:58:51","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-10-24T01:00:00-04:00","event_time_end":"2017-10-26T01:00:00-04:00","event_time_end_last":"2017-10-26T01:00:00-04:00","gmt_time_start":"2017-10-24 05:00:00","gmt_time_end":"2017-10-26 05:00:00","gmt_time_end_last":"2017-10-26 05:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"related_links":[{"url":"https:\/\/pe.gatech.edu\/certificates\/cyber-security-certificate","title":"Cybersecurity Certificate"},{"url":"https:\/\/pe.gatech.edu\/","title":"Georgia Tech Professional Education"}],"groups":[],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2662","name":"professional education"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003EFor Course-Related Questions\u003C\/h2\u003E\r\n\r\n\u003Cp\u003EPlease contact the course administrator: \u003Ca href=\u0022mailto:renita.folds@gtri.gatech.edu\u0022\u003ERenita Folds\u003C\/a\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}