The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.
Reasons to Become GREM Certified:
- Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification
- Motivate yourself to develop a new skill set by reaching for a concrete, measurable, and achievable goal embodied by the GREM certification
- Join the ranks of highly-respected professionals who possess the knowledge and skills that are relatively rare in the industry
- Reinforce and affirm your ability to understand characteristics of real-world malware, so you can better respond to incidents and reinforce defenses
Certified Skills that GREM Certified Professionals Possess
- Assemble the toolkit for malware forensics
- Perform behavioral analysis of malicious Windows executables
- Perform static and dynamic code analysis of Malicious Windows executables
- Intercept system and network-level activities in the analysis lab
- Patch compiled malicious Windows executables
- Shortcuts for speeding up malware analysis
- Core concepts for reverse-engineering malware at the code level
- x86 Intel assembly language understanding
- Identify key x86 assembly logic structures with a disassembler
- Patterns of common malware characteristics at the Windows API level
- Work with PE headers of malicious Windows executables
- Handle DLL interactions and API hooking
- Manual unpacking of protected malicious Windows executables
- Capability to subvert anti-analysis mechanisms built into malware
- Analyze protected malicious browser scripts written in JavaScript and VBScript
- Reverse-engineer malicious Flash programs
- Analyze malicious Microsoft Office (Word, Excel, PowerPoint) and Adobe PDF documents
- Examine shellcode in the context of malicious files
- Analyze memory to assess malware characteristics and reconstruct infection artifacts
- Use memory forensics to analyze rootkit infections