About this Course

Tech Type Premium
Course Code QAMAL
Duration 3 Days

This 3-day workshop is designed to give delegates the technical ‘hands-on’ understanding and crucially analysing modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains many hands-on exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.


Introduction to Malware

  • History
  • Definitions
  • Sources
  • Exercise: Building a Sandbox

The Malware Family

  • Viruses
  • Worms
  • Trojans
  • Bot Nets
  • Rootkits
  • Web Exploit Kits
  • Ransomware
  • Exercise: Rootkit infection
  • Exercise: Ransomware Infection

Threats and Exploits

  • Threat Intelligence
  • Threat & Exploit Sources
  • Exploits against the system
  • Exercise: Exploiting the operating system

Distribution and Infection

  • Distribution Methods and Tools
  • Infection Vectors

Testing Scoring and Submission

  • Standards, Schemes & Scoring

Operating Systems and Files

  • Memory & File Management

System Hardening and Baselining

  • Operating Systems & Applications
  • Memory and System

Static Analysis

  • Basic vs Advanced Analysis
  • Tools & Techniques
  • Exercise: Malware analysis - Static

Malware Evasion

  • How Malware avoids Detection

Malware Discovery Techniques

  • How to detect Malware

Dynamic Analysis

  • Using Dynamic Analysis Tools
  • Sandboxing Malware
  • Dynamic Analysis and Reporting
  • Exercise: Dynamic Malware Analysis
  • Exercise: Memory Analysis
Premium Course

3 Days


This course is authored by QA

Delivery Method

Delivery method

Classroom / Attend from Anywhere

Receive classroom training at one of our nationwide training centres, or attend remotely via web access from anywhere.

Project Management training from QA
Complete Cyber Analyst

Hand picked by our experts, these interlocking skills enable the Complete Cyber Analyst.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.