Inspect network traffic and log files to find evidence, malware, or behavior. Reverse engineer unknown binary protocols.
Investigate and retrieve malicious software artifacts from Windows systems.
Analyze malware using static and dynamic analysis techniques. Monitor the actions of executing malware and extract indicators of compromise. Reverse engineer malware and recognize encoding schemes to decode communications. Learn about special topics including malicious document analysis, string obfuscation techniques, and YARA rule creation.
Participants self-organize into teams. The teams are then let loose on a free-form set of challenges spanning multiple categories. Teammates work together to solve puzzles, sharing tips and making new professional contacts. Instructors will be available to help if your team gets stuck.
In addition to puzzles developed to test techniques taught in the previous days' training, participants can unlock hidden puzzle categories to further develop their skills in new areas through learn-as-you-play exercises.
In previous events, participants reported making an average of 5 new professional contacts. The quality of the training training and contest were each rated at greater than 4.5 out of 5.
CV and cover letter must be emailed to firstname.lastname@example.org by December 1 2016.
Selections will be made by January. If you are selected, you will be notified by January 31 2017.
You must meet the following requirements:
Yes, but it fills up quickly. Here are a few links that might help: