![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to use a symbolic engine to detect evasive forms of malware and ransomware. The learning outcomes include understanding the challenges faced by Blue Teams in reverse engineering malware, identifying unique characteristics of malware samples, and choosing between static and dynamic analysis techniques. The course teaches the skill of utilizing a symbolic engine for malware detection. The teaching method involves theoretical explanations and practical demonstrations. The intended audience for this course includes cybersecurity professionals, Blue Team members, and individuals interested in malware analysis and detection.
Syllabus
A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware
Taught by
Black Hat