Table of Contents
1. Understanding the Cyber Threat Landscape
2. Fundamentals of Malware Analysis
3. Introduction to Threat Intelligence
4. Static Analysis Techniques
5. Dynamic Analysis Techniques
6. Advanced Reverse Engineering
7. Gathering and Analysing Threat Intelligence
8. Indicators of Compromise
9. Malware Campaign Analysis
10. Advanced Anti-malware Techniques
11. Incident Response and Remediation
12. Future Trends in Advanced Malware Analysis and Intelligence
APPENDIX: Tools and Resources