SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsProcess code injection remains a common threat, exploiting modern memory architecture to execute malicious code within the address space of legitimate processes. Delve into process code injection and gain a comprehensive understanding of various techniques employed by adversaries, such as Windows API-based injection, reflective code injection, process hollowing, and process doppelgänging.
This webcast will start with a brief discussion of the foundational aspects of modern memory architecture, necessary for understanding the mechanisms and impacts of process injection. The session will then dive into each injection technique, detailing how adversaries leverage these methods to bypass security measures and gain unauthorized control over system processes.
Moving from theory to practice, we'll explore detection strategies, highlighting tools and techniques that can identify anomalous behavior indicative of process injection. In response to detected threats, we outline effective response protocols that minimize damage and preserve system integrity.
Finally, we address mitigation techniques to level-up defenses against these types of attacks.
By the end of this webinar, attendees will gain actionable insights and practical knowledge to enhance their cybersecurity posture, effectively detecting, responding to, and mitigating process code injection threats in Windows environments.