About the training
Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device, service or network. In this module students will learn how to analyse static and dynamic malware samples and investigate malware using memory forensics.
Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device, service or network. In this module students will learn how to analyse static and dynamic malware samples and investigate malware using memory forensics.
What you will learn
LO1 Critically analyse and differentiate between the main categories of malware and its obfuscation techniques. LO2 Analyse malware using static techniques gleaning information about its behaviour. LO3 Observe and interact with a malware sample observing its dynamic behaviour. LO4 Conduct forensic analysis in multiple operating systems and environments. LO5 Conduct a deep analysis of captured malicious code using memory forensics.
LO1 Critically analyse and differentiate between the main categories of malware and its obfuscation techniques. LO2 Analyse malware using static techniques gleaning information about its behaviour. LO3 Observe and interact with a malware sample observing its dynamic behaviour. LO4 Conduct forensic analysis in multiple operating systems and environments. LO5 Conduct a deep analysis of captured malicious code using memory forensics.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Anila Mjeda: Anila.mjeda@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Anila Mjeda: Anila.mjeda@mtu.ie