Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   GIAC Certification   /   GREM Certification

GIAC Reverse Engineering Malware Certification (GREM)

Practitioner Certification

The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration. Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification.






Areas Covered


Who is GREM for?


Exam Format

Note:GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE.

Course Details

1. GIAC Reverse Engineering Malware Certification

  • Analyzing Malicious Office Macros
    • The candidate will be able to analyze macros and scripts embedded in suspicious Microsoft Office files to understand their capabilities.
  • Analyzing Malicious PDFs
    • The candidate will be able to analyze suspicious PDFs and embedded scripts to understand the nature of the threat they might pose.
  • Analyzing Malicious RTF Files
    • The candidate will be able to analyze suspicious RTF files and embedded shellcode to understand their capabilities.
  • Analyzing Obfuscated Malware
    • The candidate will be able to identify packed Windows executables and obfuscated malicious JavaScript and unpack it to gain visibility of it's key capabilities.
  • Behavioral Analysis Fundamentals
    • The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
  • Common Malware Patterns
    • The candidate will be able to identify common API calls used by malware and understand what capabilities the APIs offer to the malware samples. The candidate will be able to identify common techniques used by malware including code injection, hooking, and process hollowing techniques.
  • Core Reverse Engineering Concepts
    • The candidate will apply dynamic analysis techniques to examine a malware sample in a debugger and will apply static analysis techniques to interpret common assembly instructions and patterns in Windows malware using a disassembler.
  • Examining .NET Malware
    • The candidate will be able to analyze .NET programs to understand their capabilities.
  • Identifying and Bypassing Anti-Analysis Techniques
    • The candidate will be able to identify and bypass common debugger detection and data protection measures used in malware, including the detection of security tools.
  • Malware Analysis Fundamentals
    • The candidate will be able to describe key methods for analyzing malicious software and identify the needs of malware analysis lab.
  • Malware Flow Control and Structures
    • The candidate will be able to analyze common execution flow control mechanisms, such as loops and conditional statements, in assembly language.
  • Overcoming Misdirection Techniques
    • The candidate will be able to overcome misdirecting execution workflow as an anti-analysis technique used in malware.
  • Reversing Functions in Assembly
    • The candidate will be able to analyze malware functions in assembly language to understand use of parameters, return values and other structural elements.
  • Static Analysis Fundamentals
    • The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
  • Unpacking and Debugging Packed Malware
    • The candidate will demonstrate process for unpacking malware using a debugger and repairing unpacked malware for further analysis.


Fees Structure : 15500 INR / 185 USD
Total No of Class : 36 Video Class
Class Duration : 42:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online