In this course, you will:

  • Discuss what makes a weak signature vs what makes a great signature that can find new threat variants even before your security products do.
  • Show where you can implement YARA rules, including open source and commercial products that have YARA builtin.

Other Classes We Offer

Let S2 show you what's possible

You deserve an expert security partner not just another service provider

  • Decades of experience securing Federal Enterprises and Fortune 500
  • Former NSA Operators skilled in the Adversary arts
  • Full scope Security-as-a-Service, Press the easy button.


  • Please select a service offering in which you are interested in learning more.
  • This field is for validation purposes and should be left unchanged.