Cyber security courses

Currently Kazakhstan is experiencing an acute shortage of professionals in the field of cybersecurity. Modern cyber threats require possession of unique practical knowledge and experience in IT-specialists to successfully counter such threats.

T&T Security company offers a copyrighted course on cyber security, which takes place several times a year. This course was developed by an international-level expert, who has 10 years of research in the field of cyber security within the walls of the world's universities and scientific and academic centers. The expert’s unique experience was implemented in the practical part of the course.

The course lasts 65 academic hours. The course includes theoretical, practical and laboratory exercises. Lectures are held in a flexible fashion, during the course the instructor gives all the necessary basis for understanding of the main material.

Course program (Beginner)

This introductory level is geared towards those who do not have deep expertise in malware analysis. The course covers the basics of implementing malware and cyber attacks, intrusion detection techniques and methods of expert incident investigation. Basically, this course program aims to study ways of dynamic malware analysis. In addition, students receive the basics and initial notion of reverse engineering methods.

Content

  • The general theory of malware (classification, history, trends and basics of the detection and prevention)
  • Study of malicious intrusion methods (browser (Drive-by), network, external driver, client vulnerability, attack on the user). Analysis of ways to implement on the basis of real malicious source code
  • Fundamentals of reverse engineering (disassembly, binary debugging)

Course program (Advanced)

This proposed course covers the most vital topic of cyber security - "Reverse engineering for deep analysis of malicious software and behavior forensic". Course uses a practical approach (hands-on), which involves working with a real attacks in an isolated environment for the purposes of technical analysis and development of countermeasures. In fact, participants will receive unique skills of executable-level code analysis of "live" malware.

Content

  • Autopsy of malware defenses (anti-debugging, packers, etc.)
  • Laboratory exercises: analysis of real spyware (keylogger), unpacking and decryption of malicious programs
  • Laboratory exercises: analysis and practical examination of network worms (exploits, shell codes)
  • Contemporary methods of malware detection and prevention (review of antivirus flaws from hacker’s point of view)
  • Overview of promising technologies for protecting against malicious software (behavioral analysis, virtual antivirus)

Course program (Master)

An in-depth study of ways to automate reverse engineering process in IDA PRO environment by the development of control scripts in IDA Python and IDC. Such skill will allow students to repeatedly accelerate the process of reverse engineering of any object.

Content

  • Anti-obfuscation: code and data alignment (shellcode)
  • Anti-obfuscation: imports and data recovery (section)
  • Reverse engineering automation: IDAPython (static), plugin development (IDC), IDAPython (in debug mode and data flow tracing)
  • Malware development: Theory, Concepts (Python, C ++)

These organizations completed our courses