Live Online Training
Presented By: Sergey Lozhkin
The 2 day course will take place online on the 14 and 15 September 2021.
The price is £1,300 (inc VAT/£1083.33 ex VAT).
- Core programming concepts.
- Knowledge of Windows OS architecture and APIs.
- Basic knowledge of Assembler language is a must.
This training provides all you need to know for analysing sophisticated malware used in modern real attacks against financial organisations. We will learn how to reverse malicious code used by Lazarus, Carbanak and Silence, among others. We will analyse methods, malware, payload delivery vectors, shellcodes, anti-analysis and anti detection capabilities used in modern financial attacks.
The training is 99% hands on and provides students with the core knowledge to reverse engineer financial malware, regardless of their tool of choice. This training is designed for Reverse Engineers, Security Analysts and Operators, as well as Threat Intelligence analysts who want to have a better understanding on how modern attacks against financial organisations look like. Prior reverse engineering knowledge is required – this training is not aimed for beginners.
- Reversing approach and first steps to analysing modern financial attacks.
- Static and dynamic analysis of financial APT samples and artefacts.
- Creating automatic deobfuscation tools.
- Analysis of malicious documents: shellcode and payload extraction.
Who should attend
- Reverse engineers
- Security Analysts
- Security Operators
- Threat Intelligence Analysts
About the instructor
Sergey Lozhkin is a malware reverse engineer focusing on APTs. He researches various topics in cybersecurity, mostly related to investigating and reverse engineering advanced persistence and financial threat. For 7 years, Sergey was a senior security researcher at Kaspersky Global Research and Analysis Team where he researched and published on financial threats like Carbanak, Silence, and Digital Doppelgangers and analysed many nation-state APTs samples. Based on this experience, Sergey created malware reverse engineering courses that show the most effective methods for analysing top malware threats. He’s trained both beginner and experienced malware analysts, SOC analysts in various private and government organisations all over the world, as well as law enforcement officers.