Kaspersky today announces that it has expanded its portfolio of online training for cybersecurity professionals by launching a course geared around reverse engineering. Targeted at those who already have a basic understanding of malware analysis, this self-study program will enable both individuals and teams to master applied reverse engineering skills from the comfort of their own home as they follow best practices provided by the Kaspersky Global Research & Analysis Team (GReAT).
IT Security Professionals
According to a Kaspersky survey of IT business decision makers, 41% of enterprises that plan to increase their IT security budget are doing so driven by a need to improve their security specialist expertise. In this climate, IT security professionals who wish to progress in their career should be looking to upskill themselves to meet this need.
In addition, given the past year’s pandemic restrictions, the popularity of online classes has increased significantly as a result. To help those who want to improve their malware analysis and reverse engineering capabilities online, Kaspersky has introduced a new training course dedicated to this skill.
The course allows participants to transform existing malware analysis knowledge into practical experience. This is done through hands-on learning around best practice, courtesy of Denis Legezo and Ivan Kwiatkowski, senior security researchers within the Kaspersky GReAT.
The course contains more than 50 step-by-step video tutorials based on 10 recent real-life APT cases which the trainers personally researched, including MontysThree, LuckyMouse and Lazarus.
Practical IT Exposure
Participants will master their skills through practical exposure thanks to 100 hours of dedicated virtual lab time where they can analyze these cases thoroughly and efficiently using an array of tools such as IDA Pro, Hex-Rays Decompiler, Hiew, 010Editor and many more. Objectives of the training also include the ability to perform analysis of samples written in numbers of programming or scripting languages, to handle obfuscated or encrypted content in malicious software and to ensure greater familiarity with assembly processes.
The course materials can be learned at a pace that is convenient for each learner, as they are available for a six-month period. The overall program is geared towards both individuals and wider cybersecurity units in the form of corporate training. It will be useful for security researchers, incident response personnel, malware analysts, security engineers, network security analysts, APT hunters, or security operations center (SOC) staff.
“By working on real-life case studies in dedicated labs and benefiting from Kaspersky’s expertise, participants can reshape their existing set of skills, making them better reverse engineers,” comments Costin Raiu, director of Kaspersky GReAT. “This also allows for more confidence and efficiency in applying existing skills to real-life cases in the future. As a result, the training will help them become more rounded cybersecurity professionals relative to today’s threat landscape.”
The Targeted Malware Reverse Engineering course is part of an ever-growing training portfolio where Kaspersky hosts education programs for security professionals. The portfolio also includes online education on how to hunt APTs with YARA like a ‘GReAT Ninja’. More courses will be released soon, and you can keep track of the portfolio, here.
More information on the new course and registration is available via this link.