Malware Intelligence Series: Defensive

Prerequisites: This course is open to qualified candidates with experience in cyberdefence and IT systems. Applicants should be comfortable programming in high-level languages like C, or have a strong background in interpretive languages like Python or Perl. Applicants should also have a command-level ability with either Microsoft Windows or their Linux/Unix distribution of choice.Join the bleeding edge of cyberdefence with our Defensive Operations course in the Malware Intelligence Series, a 16-week dive into the latest techniques for penetration, exploit, and malware testing.This course presents the latest in defensive strategies in the ongoing war against black-hat and state-sponsored hackers.Applicants will receive instruction f rom industry-leading experts in the use of virtual machine containment to dissect malware and methodically analyze it for clues to its functions and source.Course material is divided into smaller 2- and 3-week individual courses, each focused on a particular aspect of malware analysis, methodology, and processes.

Contact for pricing information.

Prerequisites: This course is open to qualified candidates with experience in cyberdefence and IT systems. Applicants should be comfortable programming in high-level languages like C, or have a strong background in interpretive languages like Python or Perl. Applicants should also have a command-level ability with either Microsoft Windows or their Linux/Unix distribution of choice.Join the bleeding edge of cyberdefence with our Defensive Operations course in the Malware Intelligence Series, a 16-week dive into the latest techniques for penetration, exploit, and malware testing.This course presents the latest in defensive strategies in the ongoing war against black-hat and state-sponsored hackers.Applicants will receive instruction f rom industry-leading experts in the use of virtual machine containment to dissect malware and methodically analyze it for clues to its functions and source.Course material is divided into smaller 2- and 3-week individual courses, each focused on a particular aspect of malware analysis, methodology, and processes.

Contact for pricing information.

Verified by MonsterInsights