<node id="593720">
  <nid>593720</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1500991086</created>
  <changed>1500991131</changed>
  <title><![CDATA[Open-Enrollment Course: "Introduction to Malware Analysis"]]></title>
  <body><![CDATA[<p>Malware is a growing threat to the information and intellectual property of organizations as techniques from attackers become increasingly sophisticated. This course will provide a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact. Discussions and hands-on exercises will demonstrate malware analysis processes and their complexities as well as illustrate how to appropriately size, design, and build an analytical capability best suited for your organization. Participants will prepare an analysis test-bed and analyze multiple malware samples. Think like a Black Hat, exploring advanced techniques and tools, including data exfiltration and stealthy operation, to understand the tactics of malware authors.</p>

<p><a href="https://pe.gatech.edu/courses/introduction-malware-analysis">https://pe.gatech.edu/courses/introduction-malware-analysis</a></p>

<div>
<div>
<h2>&nbsp;</h2>

<h2>Who Should Attend</h2>

<div>
<div>
<div>
<p>Information assurance officers (IAOs) and managers (IAMs), information security professionals charged with threat detection and incident response, and IT professionals seeking a greater understanding of potential malware threats and exploitation techniques</p>
</div>
</div>
</div>
</div>

<div>
<h2>&nbsp;</h2>

<h2>How You Will Benefit</h2>

<div>
<div>
<div>
<ul>
	<li>Develop foundational knowledge of malicious software, its forms, traits, author motivations, and impacts.</li>
	<li>Identify, discuss, and practice sound malware analysis processes</li>
	<li>Conduct your own analysis on multiple malware samples using state-of-the-art tools.</li>
	<li>Determine how to build an analytical capability to fit your organization, considering resource limitation and best practices.</li>
	<li>Discover Black Hat exploitation techniques and why they are difficult to detect &ndash; think like a malware author to better anticipate their actions.</li>
</ul>
</div>
</div>
</div>
</div>

<div>
<h2>&nbsp;</h2>

<h2>Content</h2>

<div>
<div>
<div>
<ul>
	<li>Malware Overview; Creating an Analysis Environment</li>
	<li>Static Analysis</li>
	<li>Dynamic Analysis</li>
	<li>Malware Analysis Lab</li>
</ul>
</div>
</div>
</div>
</div>
</div>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this two-day course.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Earn credits toward a cybersecurity certificate from <strong>Georgia Tech Professional Education </strong>with this two-day course. Malware is a growing threat to the information and intellectual property of organizations as techniques from attackers become increasingly sophisticated. This course will provide a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact.</p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-10-24T01:00:00-04:00]]></value>
      <value2><![CDATA[2017-10-26T01:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[$1595]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<div>
<div>
<div>
<div>
<div>
<h2>For Course-Related Questions</h2>

<p>Please contact the course administrator: <a href="mailto:renita.folds@gtri.gatech.edu">Renita Folds</a></p>
</div>
</div>
</div>
</div>
</div>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[(855) 812-5309]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[https://pe.gatech.edu/courses/introduction-malware-analysis]]></url>
      <title><![CDATA[Course Registration]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
          <item>
        <url>https://pe.gatech.edu/certificates/cyber-security-certificate</url>
        <link_title><![CDATA[Cybersecurity Certificate]]></link_title>
      </item>
          <item>
        <url>https://pe.gatech.edu/</url>
        <link_title><![CDATA[Georgia Tech Professional Education]]></link_title>
      </item>
      </links_related>
  <files>
      </files>
  <og_groups>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>10377</tid>
        <value><![CDATA[Career/Professional development]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>2662</tid>
        <value><![CDATA[professional education]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
