[Owasp-Malaysia] Fwd: Malware Analysis and Reverse Engineering Training

Mohd Hidzuan hidzuan at gmail.com
Tue Sep 14 02:16:54 EDT 2010


nampaknya suruh Lebai Google ajar daku lah buat masa ni.. USD889 masih belum
lagi kemampuan.. esok lusa barangkali kut.. apabila ada company di Malaysia
boleh bayar dalam Euro instead of RM.. ahakss!!

On Thu, Sep 9, 2010 at 11:24 AM, Hasanuddin Abu Bakar
<bizkutrai at gmail.com>wrote:

>
>
> Hasanuddin bin Abu Bakar
> IT Security Engineer
> Sigma Rectrix Systems
>
> Sent from my iPhone
>
> Begin forwarded message:
>
> *From:* "IMPACT" <training at impact-alliance.org>
> *Date:* 2010 September 9 09:19:00 GMT+08:00
> *To:* "'Hasanuddin Abu Bakar'" <hasan at localhost.my>
> *Subject:* *Malware Analysis and Reverse Engineering Training*
> *Reply-To:* "IMPACT" <training at impact-alliance.org>
>
>  *Malware Analysis and Reverse Engineering*
>
> *Oct 18-22, 2010*
>
> *IMPACT Global HQ*
>
> *Cyberjaya, Malaysia*
>
> International Multilateral Partnership Against Cyber Threats (IMPACT) is
> pleased to announce the *“Malware Analysis and Reverse Engineering” *training
> course.
>
> The course will examine malware in both static and runtime environments and
> take into account the viewpoint of a CIRT, security team or incident
> responder, who are attempting to identify, analyse and mitigate malicious
> activities on a compromised system. The course also accounts for network
> defenders attempting to create signatures that will allow for identification
> of malware on other compromised systems. The course will cover static,
> runtime malware analysis techniques and the use of reverse engineering tools
> such as IDA Pro and Ollydbg. This course is designed for incident
> responders, network and system administrators, CIRT/CSIRT personnel, malware
> researchers, malware investigators and anti-virus analysts.
>
> The instructor, Jonell Baltazar, is the Senior Threat Response Engineer of
> Trend Micro. He has more than five years of solid experience in malware
> analysis, botnet research, honeypot development and proactive threat
> researches. The expert threat researcher is currently researching the
> potential for abuse, misuse, and vulnerability of new technologies and
> platforms. He has also co-authored several research papers as result of
> botnet research and monitoring which includes in-depth analysis on how the
> botnet operates communication protocol and detection evasion techniques.
>
> *The course fee is at USD899. Members of (ISC) ² are entitled to 5%
> discount off the regular fees and earn up to 40 CPE points. Members of SANS
> are entitled to 5% discount off the regular fees.*
>
> *Early Bird Discount and Group Discounts are applicable.*
>
> For more information, please download the training brochure at:
> http://www.impact-alliance.org/download/services/Malware%20Analysis-eFlyer-18-22Oct2010.pdf
>
> To register, please download the registration form at:
> http://www.impactalliance.org/download/services/IMPACT_Training_Reg_Form_V2.4.pdfand send completed registration form to
> training at impact-alliance.org before or on *12 October 2010.*
>
> We look forward to hearing from you soon.
>
> IMPACT
>
> Jalan IMPACT,
>
> 63000 Cyberjaya,
>
> Malaysia.
>
>
>
> Tel.:  +(603) 8313 2161/62
>
> Fax:   +(603) 8319 2020
>
> Email: training at impact-alliance.org
>
> Web:   www.impact-alliance.org
>
>
>
>
> _______________________________________________
> Owasp-Malaysia mailing list
> Owasp-Malaysia at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-malaysia
>
> OWASP Malaysia Wiki
> http://www.owasp.org/index.php/Malaysia
>
> OWASP Malaysia Wiki Facebook
> http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-malaysia/attachments/20100914/939c5ad3/attachment.html 


More information about the Owasp-Malaysia mailing list