Learning Outcomes:
On successful completion of this module the learner will be able to:
1. Perform and document investigations into malicious threat actors using a variety of data sources.
2. Work with reverse engineers on malware analysis and identify the most valuable artefacts for retrieval.
3. Understand the current threat landscape and accurately assess the severity and ramifications of a given compromise.
Indicative Module Content:
Threat Landscape:
Common exploit techniques, email compromise, phishing, browser-based exploits, service exploitation. Lateral movement in a network, maintaining persistence in a network, e-crime, cyber espionage, cyber war.
Reverse Engineering & Debugging:
Microsoft Windows PE File format, x86 assembly language, Disassembly and debugging with IDA, Packer analysis, Malware anti-debugging techniques, Windows API.
Exploit Usage:
Weaponisation of documents, analysis of documents.