Day 1:
- Conceptual basis
- Analysis of network traffic: Connection oriented
- Based on Pattern
- Manual
- Correlation of several log sources for an accurate analysis of a certain event
- Windows Analysis Basics: Windows architecture
- Analysis of relevant Event Logs
- Registry Analysis
- Malware Persistence techniques
Day 2:
- File system analysis using the example of NTFS: Investigating and restoring deleted files
- Creation of a timeline of file system activities
- Extracting files from Disk Dump
- Malware analysis – part 1: Tools and techniques of static analysis
- Analysis and practical implementation of DLL injections
- Analysis of defective PDF- and Word documents
- Dynamic analysis of JavaScript
Day 3:
- Malware analysis – Part 2: Shellcode basics
- Dynamic analysis through Cuckoo
- Memory analysis with Volatility: Operating system data in RAM
- Malware Hide techniques
- Analysis of selected assault techniques