You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Malicious Office document is one of the most popular malware used by attackers. SOC Analysts need to understand how to analyze it.
Steps:
Prepare a table of contents
Create lesson for each title (video or text-based, video would be better)
If possible, create at least 3 practical questions for each lesson. (Some theoretical lessons like "Introduction to Malicious Office Documents" doesn't need a question)
3.1. Example question: What is the command&control server of "MalwareSample.exe"?
Prepare a walkthrough about questions
Upload everything on Google Drive and send the link to us as a comment or to [email protected]
LetsDefend team will review your materials. If necessary, will do some edits for a better format then release it.
Malicious Office document is one of the most popular malware used by attackers. SOC Analysts need to understand how to analyze it.
Steps:
3.1. Example question: What is the command&control server of "MalwareSample.exe"?
Sample Table of Content for this course:
Useful Links:
Sample courses:
The text was updated successfully, but these errors were encountered: