SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Train from anywhere. Attend a live instructor-led course remotely or train on your time over 4 months.
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Explore and tackle real-world reverse engineering malware scenarios. Learn to dissect sophisticated Windows executables that dominate headlines and preoccupy incident response teams around the globe.
I really enjoyed this course. I felt that it was a good and logical next step after taking FOR610. The material made sense and was relevant to what I see at work every day.
FOR710: Reverse-Engineering Malware: Advanced Code Analysis prepares malware specialists to dissect sophisticated Windows executables, such as those that dominate the headlines and preoccupy incident response teams across the globe. This malware reverse engineering course not only includes essential background and instructor-led walkthroughs, but also provides students with numerous opportunities to tackle real-world reverse engineering scenarios during class.
Anuj Soni, Principal Reverse Engineer at United Healthcare, has over 15 years of experience enhancing organizational security postures. His expertise has led to the identification, containment, and remediation of multiple threat actor groups.
Read more about Anuj SoniExplore the course syllabus below to view the full range of topics covered in FOR710: Reverse-Engineering Malware: Advanced Code Analysis.
Malware authors employ evasion techniques and in-memory execution to hide data, hinder analysis, and thwart detection. First, we discuss the use of malicious steganography. Then we cover key steps in program execution, identifying how code is launched and labeling functions accordingly. Finally, we analyze shellcode with the support of WinDbg Preview.
Section 2 tackles the use of encryption in malware. Adversaries use cryptography for many reasons: to encrypt files, protect keys, conceal configuration settings, and obfuscate command and control (C2) communications. Reverse engineers must be prepared to investigate and articulate the purpose of routines in high-impact malware that implement encryption.
Section 3 covers automating malware analysis. We introduce Python, writing scripts to decrypt configuration data, deobfuscate strings, and extract payloads. We cover a Dynamic Binary Instrumentation (DBI) framework, injecting and executing code within a process to examine its internals. We write Python scripts to automate debugging and dump unpacked code.
In this section, we continue discussing approaches to automating malware analysis. We introduce Ghidra’s API and write Python scripts to accelerate static code analysis. We also examine the value of binary emulation frameworks and use the Qiling framework to simulate execution and deobfuscate code and data.
Section 5 allows students to flex new skills in an independent competitive environment. With extended access to a capture the flag (CTF) platform, students must recall key concepts and perform workflows discussed in class to succeed. This is an opportunity to analyze real-world, complex malware samples and reinforce your new advanced code analysis skills.
Monitor the organisation’s cybersecurity state, handle incidents during cyber-attacks and assure the continued operations of ICT systems.
Explore learning pathResponsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
Explore learning pathResponsible for investigating cyberspace intrusion incidents and crimes. Applies tactics, techniques, and procedures for a full range of investigative tools and processes and appropriately balances the benefits of prosecution versus intelligence gathering.
Explore learning pathExecute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.
Explore learning pathAs this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.
Explore learning pathResponsible for investigating, analyzing, and responding to network cybersecurity incidents.
Explore learning pathResponsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
I really enjoyed this course. I felt that it was a good and logical next step after taking FOR610. The material made sense and was relevant to what I see at work every day.
I was recently named our IR lead, and coming from purple teaming/pentesting I needed the content of this course to make meaningful improvements to the program. I feel well prepared to tackle the challenges ahead now.
The labs and exercises for the automation were excellent and really showed off what is needed to perform RE through automation.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources