Meeting Archive:
Fresh Prints of Mal-ware: Practical Malware Analysis

Meeting Description:
Michael Sikorski, a malware analyst at Mandiant, and Andrew Honig, a malware researcher and information security expert, have teamed-up to write Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
During this Fresh Prints of Mal-ware webinar they will:
  • Highlight how to use practical malware analysis to help you become a solid malware analyst 
  • Release a new (and free) malware analysis tool called FakeNet
  • Teach you how to use FakeNet to quickly identify Network Signatures in real malware samples
By registering for this webinar, you will receive a free chapter from the book. All attendees will receive a 40% discount code that goes towards the purchase of the book. Anyone who purchases the hardcopy from using this code will receive a complimentary e-book that can be downloaded immediately after purchase.
"...the most comprehensive guide to analysis of malware, offering detailed coverage of all the essential skills required to understand the specific challenges presented by modern malware."
Chris Eagle, Senior Lecturer of Computer Science at the Naval Postgraduate School
Date: Wed, Feb 29, 2012
Time: 02:00 PM EST
Duration: 1 hour
 Presenter Information
Michael Sikorski
Michael Sikorski is a malware analyst, researcher, and security consultant at Mandiant. His previous employers include the National Security Agency and MIT Lincoln Laboratory. Mike frequently teaches malware analysis to a variety of audiences including the FBI and Black Hat.


Andrew Honig
Andrew Honig is a malware researcher and information security expert. He teaches courses on software analysis, reverse engineering, and Windows system programming. He has developed tools for detecting malicious software, including malicious software in the kernel.  Andy is publicly credited with several 0-day exploits in VMware’s virtualization products.