Certified Threat & Malware Analyst (CTMA)

For defenders to become more relevant in disrupting the kill chain, it is imperative that they also rapidly evolve their detection strategies. No longer are static rule-based detections or simple keyword searches going to help SOC teams to identify advanced threats in their environment. A more proactive approach is the need of the hour.

At Network Intelligence, we are conducting our flagship Certified Threat & Malware Analyst (CTMA) training. The 18-hours online course is spread across 4 days 4.5 hours each. The CTMA training is focused on the coverage of both Malware Analysis and Threat Hunting. It is designed to ensure that all aspects have a real-life scenario-based approach explaining the core steps needed to perform either Malware Analysis or Threat Hunting.

Training dates:


Batch 1: Asia & Middle East:

  • Date: January 17 - 20, 2022
  • Timings : 6:00 AM – 10:30 AM (GMT)
  • Duration: 4.5 hours for 4 days each (17 hours of online training and 1 hour of examination)
  • Mode: Online (GotoWebinar)
  • Fees:
    • USD 200 for regular participant
    • USD 150 for ISACA/ISC2 Participant
Register your interest


Batch 2: Americas & Europe

  • Date: January 24-27, 2022
  • Time: 2:00 PM – 6:30 PM(GMT)
  • Mode: Online (GotoWebinar)
  • Duration: 4.5 hours for 4 days each (17 hours of online training and 1 hour of examination)
  • Fees:
    • USD 200 for regular participant
    • USD 150 for ISACA/ISC2 Participant
Register your interest

The objective of the program:
  • How should one analyse a file to determine if it is malicious or not?
  • What tools can be used in Static and Behavioural Malware Analysis?
  • How should hunts be carried out?
Download CTMA Brochure (PDF)

Who should attend?
  • Chief Security Officers (CSO), Chief Technology Officers (CTO), Chief Information Officers (CIO)
  • SOC Experts & Analyst.
  • Security practitioners and managers.
  • Anyone interested in starting out in Malware Analysis Threat Hunting.
Table of Content:
Session 1: Introduction to Threat Hunting
  • Need for Threat Hunting
  • Threat Hunting Framework
  • Typical Data Sources
  • Threat Hunting Maturity Model
  • What is a Threat Hunter?
  • Threat Hunting Skills
  • MITRE ATT&CK
  • MITRE CAR
  • Current Attacks Case Studies
Session 2: Practical Threat Hunting
  • Types of Threat Hunting
  • Analysis Techniques used by a Threat Hunter
  • Creating Hypothesis
  • Understanding Log Sources in an Organisation
  • Network
  • OS
  • Solutions
  • Hunting on Network log sources
  • Firewall
  • DNS
  • Hunting on OS log Sources
  • Windows
  • Linux
  • Threat Intelligence:
  • Threat Intelligence Feeds
  • Operationalizing Threat Intelligence
  • Metrics for Threat Hunting Success
  • Reporting for Threat Hunting
Session 3: Introduction to Malware Analysis
  • Types of Malware
  • Skills required by a Malware Analyst
  • Levels of Malware Analysis
  • Sandboxing
  • Online sandboxing
  • Setting up a malware analysis lab
  • Procedures
  • Tools required
  • Non-malicious vs malicious behaviour
  • Malware attack case studies
Session 4: Practical Malware Analysis
  • Static Analysis of Malware:
  • Files and File Formats
  • Properties of files
  • Content of files
  • Malware Funnelling
  • Behavioural Analysis:
  • Analysing Process Behaviour
  • System Activity monitoring
  • Analysing network communication and packet captures
  • Extracting IOCs to be used for Blocking
  • Anti-Analysis techniques of Malware
  • Analysis of trending malware
Sample Certificate:

 

Terms & Conditions:
  • Fees, speakers and dates are subject to change.
  • Any cancellations received within the last ten calendar days would be liable for 50% of the course fees. Cancellations must be received in writing at least one week before course commencement. No-shows would be fully charged.
  • Registered attendees who are unable to attend the above course can send replacements subject to one week’s notification.
Privacy Notice:

We are committed to respecting your privacy and we recognize the importance of protecting the information collected about you. All of the personal information that you have submitted during the registration shall only in relation to your attendance at this event (i.e., processing of payments, issuance of the certificate, sending of any announcements, future events and activities). All the information that you have provided in relation to this event shall be protected with reasonable and appropriate measures and shall only be retained as long as necessary in its processing.