{"id":1453,"date":"2021-05-03T10:10:00","date_gmt":"2021-05-03T10:10:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1453"},"modified":"2024-07-24T07:58:35","modified_gmt":"2024-07-24T07:58:35","slug":"dsu-collaboration","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/","title":{"rendered":"ANY.RUN Collaborates to Benefit Dakota State University Students"},"content":{"rendered":"\n<p>ANY.RUN, an interactive online sandbox for detecting and investigating malware, has started a cooperation with <a href=\"https:\/\/dsu.edu\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Dakota State University<\/a> in Madison, S.D.&nbsp;<br><\/p>\n\n\n\n<p>Three online malware courses at DSU \u2013 Malware Analysis, Intrusion Detection, and Advanced Malware \u2013 have integrated the service into their programs, giving students a better understanding of how things unfold in real-time. These clear demonstrations in class show malware behavioral activity, with an opportunity to interact with it directly.&nbsp;<br><\/p>\n\n\n\n<p>Beginners and advanced analysts who are eager to boost their knowledge in the sphere can take these master and undergraduate programs. The main benefit is that all lectures and labs are dedicated largely to analysis practice, from malware delivery to lateral movement, obfuscation, reverse-engineering, and others.&nbsp;<br><\/p>\n\n\n\n<p>Dr. Josh Stroschein, assistant professor of Cyber Security and Network &amp; Security Administration at Dakota State, has been working with the company for some time and is using the company\u2019s services in his classes.&nbsp;<br><\/p>\n\n\n\n<p>He is also working with students to write technical analysis blogs to be published on ANY.RUN\u2019s blog site. This is part of his efforts with mentoring students. \u201cI\u2019ve been working with several students to help them grow as malware analysts, and find them professional opportunities,\u201d he said. Because they are a globally recognized company, having blogs on ANY.RUN \u201cwould look great on student\u2019s resume.\u201d The <a href=\"https:\/\/madlabs.dsu.edu\/madrid\/blog\/2021\/04\/19\/analysis-of-password-protected-malicious-word-document\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">first student blog<\/a> was posted in late April.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>Let\u2019s have a look at what are these courses about:&nbsp;<br><\/p>\n\n\n\n<p><strong>Malware Analysis<\/strong><br><\/p>\n\n\n\n<p>This course provides fundamental knowledge of malware analysis. Students learn static and dynamic techniques for investigating unknown binaries as well as malware detection.<br><\/p>\n\n\n\n<p><strong>Intrusion Detection<\/strong><br><\/p>\n\n\n\n<p>Threat hunting and detection are the main focus of this program. Topics will include signature, anomaly, and emerging detection methods on a network and host level.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p><strong>Advanced Malware&nbsp;<\/strong><br><\/p>\n\n\n\n<p>The course covers advanced techniques used in malware analysis.&nbsp; There are many themes that students learn; anti-reverse engineering methods and advanced obfuscation practices are some of them.&nbsp;<br><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in_house&amp;utm_content=dakota\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a> is integrated into each of these courses. The service helps students to analyze, debug, and reverse engineer unknown binaries.&nbsp; It also allows students to explore the large database with relevant IOCs and fresh samples. And see the Network activity without waiting. Students make use of ANY.RUN here to monitor malware behavior and explore the results.&nbsp;<br><\/p>\n\n\n\n<p>We are glad that our service has become a part of several DSU programs. We hope it will make the process of education for young cybersecurity specialists easier and faster.&nbsp;<br><\/p>\n\n\n\n<p>Malware analysis is definitely not an easy topic, so if you are eager to start or continue your journey with that \u2013 courses like that are the best choice. Especially, when it is combined with modern tools like ANY.RUN.&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN, an interactive online sandbox for detecting and investigating malware, has started a cooperation with Dakota State University in Madison, S.D.&nbsp; Three online malware courses at DSU \u2013 Malware Analysis, Intrusion Detection, and Advanced Malware \u2013 have integrated the service into their programs, giving students a better understanding of how things unfold in real-time. These [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,60],"tags":[58,34],"class_list":["post-1453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-training","category-news","tag-cybersecurity-training","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Collaboration with Dakota State University - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN integrates with 3 malware courses collaborates to benefit DSU students. Read the full announcement about the partnership in our blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Collaborates to Benefit Dakota State University Students\",\"datePublished\":\"2021-05-03T10:10:00+00:00\",\"dateModified\":\"2024-07-24T07:58:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\"},\"wordCount\":475,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity training\",\"malware analysis\"],\"articleSection\":[\"Analyst Training\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\",\"name\":\"Collaboration with Dakota State University - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-05-03T10:10:00+00:00\",\"dateModified\":\"2024-07-24T07:58:35+00:00\",\"description\":\"ANY.RUN integrates with 3 malware courses collaborates to benefit DSU students. Read the full announcement about the partnership in our blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Collaborates to Benefit Dakota State University Students\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Collaboration with Dakota State University - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN integrates with 3 malware courses collaborates to benefit DSU students. Read the full announcement about the partnership in our blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Collaborates to Benefit Dakota State University Students","datePublished":"2021-05-03T10:10:00+00:00","dateModified":"2024-07-24T07:58:35+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/"},"wordCount":475,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity training","malware analysis"],"articleSection":["Analyst Training","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/","url":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/","name":"Collaboration with Dakota State University - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-05-03T10:10:00+00:00","dateModified":"2024-07-24T07:58:35+00:00","description":"ANY.RUN integrates with 3 malware courses collaborates to benefit DSU students. Read the full announcement about the partnership in our blog.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/dsu-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Collaborates to Benefit Dakota State University Students"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1453"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1453"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1453\/revisions"}],"predecessor-version":[{"id":8289,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1453\/revisions\/8289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8310"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}