Ready to Start Your Career?

By: Olivia
February 28, 2017
How to get Malware Certified

By: Olivia
February 28, 2017
I’ve been on a mission to answer the question, “How do I get _________ certified?”
In recent posts, I’ve dove into how to earn the TCP/IP certification and how to best utilize your hard earned certifications on your resume. With new micro certifications being released weekly, it’s important to show users truly how limitless their options are when it comes to learning new skills on a variety of topics.My hope is to make micro certifications more accessible to ensure that as they increase in popularity, users are aware of the process for getting certified, and which certifications are a best fit for their needs.The most common concern with earning micro certifications is that many are unsure where to start. Maybe you’re new to IT or cyber security in general. Maybe you’ve been in the field for some time but are looking to branch out from your traditional course of work.Whatever the case may be, I advise taking a look at the entire course catalog before jumping right in. Consider what level you are starting at as you browse the available certifications.Each certification description should accompany with it an answer to the question “why do I need this certification?” If the answer to that question aligns with your goals, then chances are it is a best fit for you.I recommend that while you browse the catalog, make a list or add to your favorites any certification that catches your eye so you can easily go back to that page later.If, after following this process, you’re still stuck, considering asking for advice in the forums. Members of the community bring unique perspectives and experience when it comes to a learning skills tailored for a specific goal or job.For this post, let’s take a look at the NEW Malware Fundamentals Micro Certification.But first, let’s delve into malware further.What is malware?An umbrella term used to refer to a variety of forms of hostile or intrusive software, malware includes computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.Okay, tell me more:Malware works to remain unnoticed, either by actively hiding or by not making its presence on a system known to the user. Almost every system or network breach involves a trojan, backdoor, virus, or rootkit.What makes malware so harmful?According to ComputerWeekly.com, “The bad news is that malware, once characterized by harmless viruses and annoying adware, is increasingly used for criminal activities. So much so that it is introducing new terms to the computer world, like crimeware. Even completely novel applications of computer code to the crimeware cause are surfacing. A new form of malware known as ransomware attempts to hold a user's computer files hostage.”More startling statistics: According to the Verizon Data Breach Report 2015, “70-90% of malware samples are unique to an organization.”What careers will a malware certification prepare me for?The most common career would be a malware analyst. They work to examine, identify, and understand the nature of cyber-threats. Because malicious code comes in many different forms, a malware analyst must be thoroughly familiar with both interpreted and compiled programming languages and must possess a keen understanding of both reverse engineering and software development.Malware analysts recommend and sometimes carry out procedures designed to help systems recover from any damage inflicted, but the majority of their work is concerned with preventing the spread of malware in the first place.Other related titles this certification will qualify you for are: security analyst, vulnerability researcher, computer crime investigator, incident responder, computer forensics analyst and eventually, CISO.Common personality types of malware analysts:- Fast learner
- Able to make sense of complicated scenarios
- Likes solving puzzles
- Able to think outside the box
- Understands the scientific method and can apply it to an analysis
- Resourceful
- What malware is
- What the different types of malware are
- How different types of malware work
- How to recognize common malware
- How to perform dynamic and static analysis on all major file types
- How to carve malicious executables
- “Run time” analysis
- Debugging
- Disassembling malicious binaries
- Network traffic analysis