Certified Malware Investigator (CMI) Training in Finland

  • Learn via: Classroom
  • Duration: 5 Days
  • Price: From €4,225+VAT
We can host this training at your preferred location. Contact us!

This is a core-level technical course for people looking to extend their digital forensic knowledge beyond conventional device analysis.

COURSE OVERVIEW

On this four-day practical course you will investigate forensic case studies, applying the principles, knowledge and techniques learnt during the course. It will help you protect your IT environment by showing you how to conduct malware analysis, from first principles all the way to investigating network activity stemming from malicious software infection that your AV software has failed to detect.

.

Completion of the CFIP course is highly recommended. Otherwise you will need:

  • Knowledge of the principles surrounding forensic investigation and an understanding of the preliminary forensic investigation case considerations
  • Sound experience with the Microsoft Windows operating systems
  • An understanding of how a web page is requested and delivered
  • Ideally an understanding of Command Line Interface (CLI) and TCP/IP networking concepts

WHO SHOULD ATTEND

For those looking to develop their skills in malware identification and analysis, including:

  • Digital forensic analysts
  • Cyber incident investigators
  • Law Enforcement Officers
  • System administrators

THE SKILLS YOU WILL LEARN

Practical application of course content will be through the use of case scenarios in order to gain a practical understanding of modern malware beyond the often quoted traditional principles; mount forensic images for analysis; build virtual machines for analysis, and build a network environment to carry out network forensic analysis.

KEY BENEFITS

The course will give you:

  • You will learn how to identify, analyse and interpret malicious software and associated forensic artefacts, including Trojan horses, viruses, worms, backdoors and rootkits
  • How Trojan payloads can be used to bypass anti-virus software, personal and corporate firewalls
  • You will practice malware investigations from mounted, booted and network perspectives, and undertake real-world exercises, including the conversion of E01 forensic images to bootable virtual machine disks
  • The function, structure and operation of the Windows registry, and investigation of malicious software locations in the registry and file system
  • The skills to analyse and interpret malicious software, and investigate network activity initiated by malicious software infection
  • An understanding of how to simplify complex evidence, and collate and report results
  • An industry-recognised qualification in malware investigation

Analysis Environments

  • Identify and define the five analysis environments
  • Identify situations in which each of the investigation environments could be used effectively
  • Identify their respective levels of risk both to the original data as well as other systems

Malicious Software

  • Define the term 'malicious software'
  • Identify and define different types of malicious software
  • Identify similarities and differences between different types of malicious software

Malware Investigation

  • Identify the stages of malware investigation
  • Critically assess the capabilities and limitations of anti-malware tools
  • Identify the different means of running software at system start-up

Methods of Deception

  • Identify mechanisms of malware delivery
  • Identify mechanisms of disguise
  • Identify client security circumvention

Mounted Analysis

  • Mounting forensic images as logical drives
  • Using malware scanners against the mounted image
  • Documenting the results of malware scans
  • Using online scanners for further clarification

Booted Analysis

  • Identify approaches to creating a booted analysis environment
  • Experiment with making a Virtual Machine
  • Identifying password implications
  • Identifying and explaining the potential differences between mounted and booted analysis results

Network Analysis

  • Identify key reasons for network analysis
  • Methods of building a network for analysis
  • Explaining network communication protocols
  • Using traffic analysis tools for network analysis
  • External Port Analysis
  • Identifying and explaining the potential differences between network and other analysis results

Virtualisation Malware

  • Explain how hardware Hypervisor support allows for virtualisation malware
  • Define Type I, Type II and Type III malware

Simplifying Complex Evidence

  • Aiming the report at a subject knowledge level fitting the target audience
  • Discuss a sample report outline


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Finland facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
08 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
20 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
27 elokuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
01 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
04 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
07 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
12 syyskuuta 2024
Helsinki, Espoo
5 Days
Classroom / Virtual Classroom
22 syyskuuta 2024
Helsinki, Espoo
5 Days
Certified Malware Investigator (CMI) Training Course in Finland

Finland is a country located in northern Europe. Helsinki is the capital and largest city of the country. The majority of the people are Finns but there is also a small Lapp population in Lapland, where the country is famous for the Northern Lights. Finland's national languages are Finnish and Swedish.

Known for its vast forests, lakes, and natural beauty, Finland is one of the world's largest producers of forest products, such as paper, pulp, and lumber. One of the world's largest sea fortresses Suomenlinna, Rovaniemi with the "White Nights", dogsled safaris and of course the Northern Lights are what makes Finland so popular for tourists. Finland is one of the best places in the world to see the Northern Lights and attracts millions of tourists during its seasons.

Finland is home to a thriving technology industry and is widely recognized as one of the world's leading technology hubs. Companies such as Nokia and Rovio (creator of the popular game Angry Birds) are based in Finland. Some of the key factors that have contributed to Finland's success in technology include; strong investment in research and development, a highly educated workforce and fundings.

Finland has a strong educational system, and is widely regarded as one of the world's most literate countries. In fact, Finland's literacy rate is one of the highest in the world, and its students consistently perform well in international tests of math and reading ability.

Also, as a pioneer in environmental sustainability, Finland is known for its efforts to reduce its carbon footprint and promote clean energy. This Nordic country is also famous for its unique and distinctive cultural heritage, including its traditional folk music and its elaborate traditional costumes.

Helsinki, Finland's capital city, is the country's business center. Helsinki is Finland's largest city, and it is home to many of the country's major corporations and organizations, including many of the country's leading technology firms. The city is also a commercial, trade, and financial center, as well as one of the busiest ports in the Nordic region.

Take advantage of our diverse IT course offerings, spanning programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our knowledgeable instructors will provide you with practical training and industry insights, delivered directly to your chosen venue in Finland.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.