[Owasp-Malaysia] Fwd: Malware Analysis and Reverse Engineering Training

Hasanuddin Abu Bakar bizkutrai at gmail.com
Wed Sep 8 23:24:29 EDT 2010


Hasanuddin bin Abu Bakar
IT Security Engineer
Sigma Rectrix Systems

Sent from my iPhone

Begin forwarded message:

*From:* "IMPACT" <training at impact-alliance.org>
*Date:* 2010 September 9 09:19:00 GMT+08:00
*To:* "'Hasanuddin Abu Bakar'" <hasan at localhost.my>
*Subject:* *Malware Analysis and Reverse Engineering Training*
*Reply-To:* "IMPACT" <training at impact-alliance.org>

 *Malware Analysis and Reverse Engineering*

*Oct 18-22, 2010*

*IMPACT Global HQ*

*Cyberjaya, Malaysia*

International Multilateral Partnership Against Cyber Threats (IMPACT) is
pleased to announce the *“Malware Analysis and Reverse Engineering” *training
course.

The course will examine malware in both static and runtime environments and
take into account the viewpoint of a CIRT, security team or incident
responder, who are attempting to identify, analyse and mitigate malicious
activities on a compromised system. The course also accounts for network
defenders attempting to create signatures that will allow for identification
of malware on other compromised systems. The course will cover static,
runtime malware analysis techniques and the use of reverse engineering tools
such as IDA Pro and Ollydbg. This course is designed for incident
responders, network and system administrators, CIRT/CSIRT personnel, malware
researchers, malware investigators and anti-virus analysts.

The instructor, Jonell Baltazar, is the Senior Threat Response Engineer of
Trend Micro. He has more than five years of solid experience in malware
analysis, botnet research, honeypot development and proactive threat
researches. The expert threat researcher is currently researching the
potential for abuse, misuse, and vulnerability of new technologies and
platforms. He has also co-authored several research papers as result of
botnet research and monitoring which includes in-depth analysis on how the
botnet operates communication protocol and detection evasion techniques.

*The course fee is at USD899. Members of (ISC) ² are entitled to 5% discount
off the regular fees and earn up to 40 CPE points. Members of SANS are
entitled to 5% discount off the regular fees.*

*Early Bird Discount and Group Discounts are applicable.*

For more information, please download the training brochure at:
http://www.impact-alliance.org/download/services/Malware%20Analysis-eFlyer-18-22Oct2010.pdf

To register, please download the registration form at:
http://www.impactalliance.org/download/services/IMPACT_Training_Reg_Form_V2.4.pdfand
send completed registration form to
training at impact-alliance.org before or on *12 October 2010.*

We look forward to hearing from you soon.

IMPACT

Jalan IMPACT,

63000 Cyberjaya,

Malaysia.



Tel.:  +(603) 8313 2161/62

Fax:   +(603) 8319 2020

Email: training at impact-alliance.org

Web:   www.impact-alliance.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-malaysia/attachments/20100909/31d315ad/attachment.html 


More information about the Owasp-Malaysia mailing list