Focal Point

Malware Reverse Engineering Training

Malware Reverse Engineering Training

Malware Reverse Engineering builds on the knowledge and skills from earlier courses in the track and teaches students how to perform more advanced analysis of real-world malware samples. The primary techniques taught are disassembly and debugging. The course also covers topics such as data decoding and binary obfuscation in order to bypass protections and perform effective analysis on hardened samples, how to deal with destructive malware, and how to defeat anti-debugging and other anti-analysis techniques.

Training at a glance

Level

Intermediate

Duration

5 Days

Experience

2 years: Malware

Average Salary

$136,286

Labs

Yes

Level

Duration

Experience

Average Salary

Labs

Training Details

Linux Kernel Internals Training

Our training doesn’t consist of a set of video lectures followed by unguided work assignments, as is the case with all other Malware Reverse Engineering training programs. Instead, our proprietary Artificial Intelligence-based training platform delivers you bite-sized knowledge that is immediately followed by hands-on exercises, during which the platform watches your every step and helps you with contextual help, hints, and templates, as needed; and you have a personal tutor and coach who help you every step of the way.

After successfully completing this course, students will be able to:
  • Use IDA Pro, OllyDbg, x64dbg, and other tools to analyze and debug malware, and report on its capabilities
  • Describe in detail the structure and functions of the Portable Executable (PE) header, and analyze PE headers to aid in malware characterization
  • Apply techniques for identifying, analyzing, and bypassing data obfuscation Understanding the structure and use of Dynamic Linked Libraries (DLLs) and apply reverse engineering skills to DLL analysis
  • Identify and overcome a range of anti-debugging and anti-analysis techniques used in modern malware
  • Identify developer code in a compiled binary
Learners will be required to:
  • Analyze and report on a real-world malware sample that employs anti-analysis techniques

Upcoming Classes

We offer more than just Focal Point Training

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.