GIAC Malware Analysis Certification: GREM

GIAC Malware Analysis Certification: GREM

The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.

Reasons to Become GREM Certified:

  • Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification
  • Motivate yourself to develop a new skill set by reaching for a concrete, measurable, and achievable goal embodied by the GREM certification
  • Join the ranks of highly-respected professionals who possess the knowledge and skills that are relatively rare in the industry
  • Reinforce and affirm your ability to understand characteristics of real-world malware, so you can better respond to incidents and reinforce defenses

Certified Skills that GREM Certified Professionals Possess

  • Assemble the toolkit for malware forensics
  • Perform behavioral analysis of malicious Windows executables
  • Perform static and dynamic code analysis of Malicious Windows executables
  • Intercept system and network-level activities in the analysis lab
  • Patch compiled malicious Windows executables
  • Shortcuts for speeding up malware analysis
  • Core concepts for reverse-engineering malware at the code level
  • x86 Intel assembly language understanding
  • Identify key x86 assembly logic structures with a disassembler
  • Patterns of common malware characteristics at the Windows API level
  • Work with PE headers of malicious Windows executables
  • Handle DLL interactions and API hooking
  • Manual unpacking of protected malicious Windows executables
  • Capability to subvert anti-analysis mechanisms built into malware
  • Analyze protected malicious browser scripts written in JavaScript and VBScript
  • Reverse-engineer malicious Flash programs
  • Analyze malicious Microsoft Office (Word, Excel, PowerPoint) and Adobe PDF documents
  • Examine shellcode in the context of malicious files
  • Analyze memory to assess malware characteristics and reconstruct infection artifacts
  • Use memory forensics to analyze rootkit infections