SecurityXploded will be conducting
FREE Security Training series on
Reverse Engineering/Malware Analysis/Exploit Development over multiple sessions. First set of series will be delivered in our upcoming monthly community meet at Bangalore starting from Jan 2012.
|
|
|
Table of Contents - Session 1 - Lab Setup Guide
- Session 2 - Operating System Basics
- Session 3 - Assembly Basics
- Session 4 - Reverse Engineering Basics and Tool Guide
- Session 5 - Practical Reversing I - Malware Analysis
- Session 6 - Practical Reversing II - Unpacking Malware
- Session 7 - Practical Reversing III - Malware Memory Forensics
- Session 8 - Practical Reversing IV - Advanced Malware Analysis
- Session 9 - Practical Reversing V - Exploit Development [basic]
- Session 10 - Practical Reversing VI - Exploit Development [advanced]
- Session 11 - Case Study: TDSS Rootkit Analysis
- Session 12 - Further Reading & Future Roadmap
Trainer Profiles | | | | Nagareshwar is a independent Security Researcher and founder of SecurityXploded. He has around 10 years of security expertise in Reverse Engineering, Malware Analysis, System Security, Virtualization and Software Development. He has published numerous research articles and developed more than 70 security softwares.
He is an invited speaker for various universities and has delivered the presentation/hands-on session on various topics including 'Vista Security', 'Password Forensics', 'Application Virtualization', 'Detecting & Defending against Security Vulnerabilities' etc. |
| | | Amit Malik has a rich experience of about 4 years in the security domain with expertise in exploit and malware analysis. He has presented many novel techniques such as 'Botnet Detection using Machine Learning', 'Shell Code Detection' etc and developed many open source tools like Exescan, Zexplo, Injector. Recently he has also filed a patent on "Generic Detection of Malicious Websites".
In the past he has delivered various security training sessions for Govt as well as non-Govt organizations. He had also worked as technical advisor for Govt Investigative & Defense agencies. Currently he is working as a Security Researcher at McAfee Labs. |
| | | Swapnil has experience of around 5 years in Security domain. He started his career at Symantec where he was involved in Classification and writing Detection routines for latest Malware families.
He is currently working at McAfee as Research Engineer. Here his work involves analyzing and researching network aware Malwares and design various heuristics/routines to detect them. |
| | | Abhijit started his career as Security Professional at Symantec where he has worked extensively on Malware Identification, Classification and Analysis.
Recently has has moved to McAfee and currently working on identification of latest Malware Threats and developing technologies to block them. His overall expertise include Exploit research and Development, Unpacking Packers, Rootkit Detection etc. |
| | | Harsimran, an IIT Delhi alumni, is a Independent Security Researcher and passionate about computer security with specialization is in the field of Offensive Security. He is author of various technical blogs and research papers.
In the past he has delivered training sessions on Fuzzing, Malware Analysis, Offensive Metasploit, Exploit development et. al. Recently he has presented at "NullCon 2011" on the topic "Reversing Microsoft Patches to reveal Vulnerable Code". Currently he works as Research Scientist at McAfee Labs. |
| | | Monnappa has rich experience of about 5 years in the security domain with core expertise in exploit development and malware analysis.Currently he is working at Cisco Systems as Information Security Investigator. Recently he has delivered presentation on 'Malware PDF Analysis' in the "Null/SecurtityXploded/G4h/OWASP" meet.
Apart from doing Malware Analysis and writing tools in spare time, he has also discovered vulnerabilities and written exploits in popular Windows softwares. |
|
|
|
|
|
|
|
0 comments:
Post a Comment