Check Point HackingPoint™ Malware Analysis Fundamentals (CCHP-MAF) – Outline

Detailed Course Outline

Introduction to Malware

  • Who perpetrates these attacks?
  • What is their goal?
  • Types of malware
  • Malware history and evolution

Malware Behavior and Techniques

  • Malware lifecycle
  • Infection, persistence, privilege escalation
  • Stealth, network communication

Malware Analysis Overview

  • Analysis types
  • Tools and techniques

Triage Analysis

  • Identifying malware
  • Analyzing the PE header
  • Examining static features
  • Utilizing OSINT tools

Dynamic Analysis — OS Behavior

  • Monitoring OS activity — process, file, registry
  • Mapping execution flow
  • Detecting malicious behaviors such as, persistence, injection, hooking

Dynamic Analysis — Network Behavior

  • Malware communication techniques
  • Analyzing malware traffic
  • Controlling responses

Analyzing Malicious Office Documents

  • Droppers and downloaders
  • Debugging macro scripts

Automated Analysis

  • Working with sandboxes
  • Evasion techniques and how to bypass them