top of page
Hunting malisiousness using DNS

HUNTING MALICIOUSNESS USING DNS                                                       

Price: 

€925

Duration: 

1 day

Format: 

Online 

Level: 

Intermediate 

Irena Damsky

Trainer 

Irena Damsky

Irena Damsky is the founder of Damsky.tech. She is a security and intelligence researcher and developer based in Israel. Her focus is on threat intelligence, networking, malware and data analysis and aking out bad guys, while also running the company and providing different services.


Prior to starting Damsky.tech, Irena was VP of Security Research for a US-based startup, established the Threat Intelligence group for Check Point Software and served over six years in the Israeli Intelligence Forces, where she now holds the rank of Captain in the Reserve Service. She is a frequent speaker at security events, holds a BSc and MSc in Computer Science, and is fluent in English, Russian and Hebrew.

About the training: 

DNS is one of the basic layers that holds the internet together. Without it, not much else works... not even malware. In this training course we will focus on how to use DNS to the advantage of defending networks. With good techniques it is possible to find a great deal of misuse based on DNS such as DGAs, fast/double flux networks, phishing and brand impersonation. Tools like passive DNS, whois and active probing allow defenders to proactively search for malicious indicators before they are operationalized so defenders can get ahead of the attack cycle.

Training focuses on the use of DNS for malware hunting, detection of new infrastructure, discovery of new network assets and other “research” type products. There is an emphasis on hands-on labs while also covering some theory and history of DNS. Multiple topics are available and can be tailored to the class based on their interest.

Key takeaways:

  • DNS for malware hunting

  • Learn about all the resources you can use for DNS analysis

  • Discover malicious activity through DNS data

What you get after the training:

  • itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile) 

  • Course materials 

  • Practical skill to elevate your career to the next level 

  • After-training consultancy and support 

  • Expansion of your professional network in the cybersecurity industry 

  • Stronger cybersecurity posture of your business

bottom of page