• English
  • Mon - Fri 8.00 - 18.00
  • 5 rue Goell L-5326 Contern
  • + 352 26 20 39 64
Excellium University
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog

Office Document Analysis

Teachers
Paul Jung
Category:
HACKING & FORENSICS /
Free
hacking

Free

Duration: 2 days

DATE :

From March 29th to March 30th 2021, 

From July 1st to July 2nd 2021, 

From November 4th to November 5th 2021. 

COURSE DESCRIPTION

Excellium proposes a two-day training named «Office documents analysis». It will enable you to understand how the malwares are using office documents as initial infection stage.
It will help your Incident response team to determine by itself if an office document is malicious. At the end of the training, you will be able to extract the payload and determine the IOC of a sample.
The training is 50% lectures and 50% lab.

The following courses syllabus will be learned :
• Treat landscape
• Setup forensic Lab and Tools
• Why opening theses files & document identification.
• Understand how macro deliver payload.
• Extraction of Macro.
• Macro Goal.
• Obfuscation.

The course will start by a refresh on the current threat landscape. The student will learn how to setup his own office analysis lab and will learn and practise the identification, analyse on various malicious office documents.
The student will learn how obfuscation is in place and how to isolate a shellcode or an malicious payload.
After this formation, the student will be able to qualify the maliciousness of a given office document by his own.

REQUIREMENTS

Knowledge of Linux, Python and scripting

To perform this activity, you must attend the training with a laptop having an internet connection. The following browser are supported:
• Internet Explorer 9 or later
• Safari 6 or later
• Firefox 21 or later

You should have the basics skills in UNIX commands lines in order to be able to perform the lab activities.

WHAT IS THE TARGET AUDIENCE ?

- Network Administrator
- Systems Administrator
- Systems Engineer
- Systems Architect
- Network Security Specialist
- Developper

Beginner level

CONTACT

About Instructors

Paul Jung
Paul Jung is since a long time a security enthusiast. He possesses a wide range of skills and experiences that enable him to perform multiple roles from offensive security audit to security incident handling.

Free

Duration: 2 days

Contact

  • Excellium : 5 rue Goell L-5326 Contern or Oxiane 20, rue de l’Industrie – L – 8399 Windhof (Koerich)
  • +352 26 20 39 64 or Oxiane +352 27 39 35 1
  • training@excellium-services.com
Copyright © 2017 Excellium University
Mentions légales
Privacy Statement
  • Home
  • About Us
  • Courses
  • Contact Us
  • Blog
Search