Ultimate Malware Analysis

Learn to identify and respond to malware attacks

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom & Virtual Instructor-Led Training

IT professionals charged with protecting their environment can become overwhelmed, causing malware attacks to be ignored or mistakenly diagnosed as a system or network problem. During this course, we provide you with the techniques to identify, respond to, and recover from malware-related incidents.

What You'll Learn

McAfee Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise networks and share their methodologies in the classroom.

Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

Why We Teach This Course

Hackers use malware in an attempt to steal data and compromise business systems. This course gives you the skills to identify, respond to, and recover from malware-related incidents.

Who Teaches this Course

Foundstone consultants and managers, who actively practice network penetration engagements on many of the world’s leading corporate, government, and military networks, bring real-world scenarios to the classroom. Collectively, they have performed hundreds of web and e-commerce security assessments, as well as managed security programs at Big Five consulting firms, the United States Air Force, and on Wall Street. Foundstone instructors authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions,” one of the industry’s most popular and respected computer security guides.

Who Should Take this Course

This course is for system and network administrators, security personnel, auditors, consultants, and web designers concerned with web security. Basic Unix and Windows NT competency is required for this course to be fully beneficial.

Continuing Education Credits

This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.