Web Content Display

News

Ransomware attacks see resurgence in 2023. A report released this week reveals manufacturing as the top targeted industry for ransomware attacks.

Wed, 03 May 2023 07:04
1143 Visit

Archive formats, such as ZIP and RAR files, are the most common types of files for delivering malware. They have surpassed Office files for the first time in three years.

Sat, 03 Dec 2022 14:15
1358 Visit

Three Android apps with millions of downloads on the Google Play store had several flaws that could allow attackers to remotely execute commands and steal credentials.

Sat, 03 Dec 2022 16:39
1582 Visit

Courses

« Back

Malware Analysis

Malware Analysis


Malware analysis training is one of the special specialties in the field of information security that few people are drawn to. In the malware analysis training course, you will learn about the nature of malware, types of malware, detecting the existence of malware, analyzing processes, and knowing how malware works, etc.

Introduction

Definition of malware

Description of types of malware

Description of the attack methods of various types of malware

Ways of malware penetration into the system

Description of malware obfuscation methods

Description of malware encryption methods and how to open this type of encryption

Introduction of important Windows APIs

Defensive techniques of malware

Description of anti-disassembly technique

Description of the anti-virtual machine technique

Description of anti-debug technique

Packing

Different packing methods

Methods of opening different Packers

Methods of hiding APIs

Code injection

Introducing types of malware analysis

Basic static analysis

Dynamic base analysis

Advanced static analysis

Advanced dynamic analysis

Introduction of tools

Introduction of static analysis tools

Introduction of dynamic analysis tools

Introduction to IDA

Getting to know OllyDbg

 


Services

Services that can be provided by APA Center of Shiraz University

  • Providing security advice during the design of computer networks
  • Providing educational advice in order to establish CERT centers in executive bodies and industries
  • Providing advice in the field of security standardization and determining organizational security policies
  • Risk assessment of computer networks and information technology systems of organizations
  • Penetration testing of computer networks and network applications
  • Security analysis of new hardware and software products
  • Responding to security incidents (assistance, legal inspection, information recovery and services)
  • Holding information technology and network security training courses for managers and experts
  • Providing specialized training courses on new malware analysis
  • Providing guidelines and specific security standards for industrial control systems
  • Providing expert advice in order to improve the security of industrial networks in various industries
  • Providing security testing services for industrial networks
  • Providing services for dealing with cyber incidents in industrial networks
  • Analyzing the performance of malware discovered in industrial control systems and providing software packages to identify and deal with malware.
  • Regular monitoring of news related to threats and vulnerabilities of industrial control systems
  • Training of specialized and experienced experts in the field of improving the security of industrial control systems and dealing with industrial malware
  • Holding general and specialized training courses in the field of cyber security for managers and experts
  • Preparation and compilation of special educational tools and packages to the order of organizations