Malware Reverse Engineering

Malware Reverse Engineering builds on the knowledge and skills from earlier courses in the track and teaches students how to perform more advanced analysis of real-world malware samples. The primary techniques taught are disassembly and debugging. The course also covers topics such as data decoding and binary obfuscation in order to bypass protections and perform effective analysis on hardened samples, how to deal with destructive malware, and how to defeat anti-debugging and other anti-analysis techniques.

Length: 5 Days

Focal Point

Enjoy the best in Malware Reverse Engineering Training

Malware Reverse Engineering builds on the knowledge and skills from earlier courses in the track and teaches students how to perform more advanced analysis of real-world malware samples. The primary techniques taught are disassembly and debugging. The course also covers topics such as data decoding and binary obfuscation in order to bypass protections and perform effective analysis on hardened samples, how to deal with destructive malware, and how to defeat anti-debugging and other anti-analysis techniques.

vmware vsphere 6.7

Linux Kernel Internals Training

Our training doesn’t consist of a set of video lectures followed by unguided work assignments, as is the case with all other Malware Reverse Engineering training programs.

Instead, our proprietary Artificial Intelligence-based training platform delivers you bite-sized knowledge that is immediately followed by hands-on exercises, during which the platform watches your every step and helps you with contextual help, hints, and templates, as needed; and you have a personal tutor and coach who help you every step of the way.

Learning Objectives

  • After successfully completing this course, students will be able to:

          • Use IDA Pro, OllyDbg, x64dbg, and other tools to analyze and debug malware, and report on its capabilities
          • Describe in detail the structure and functions of the Portable Executable (PE) header, and analyze PE headers to aid in malware characterization
          • Apply techniques for identifying, analyzing, and bypassing data obfuscation
          • Understanding the structure and use of Dynamic Linked Libraries (DLLs) and apply reverse engineering skills to DLL analysis
          • Identify and overcome a range of anti-debugging and anti-analysis techniques used in modern malware
          • Identify developer code in a compiled binary

Prerequisites

Expert Instructors

Learners will be required to:

      • Analyze and report on a real-world malware sample that employs anti-analysis techniques
Toggle Filters
Want to run this course in-house?
None of these dates work for you?

Different Learning Styles Require Different Delivery

One size never fits all when it comes to individual learning and training.  Our Student Navigators are trained to effectively assess your overall training goals and map them to the best courses and delivery formats to meet your objectives, as well as your personal learning style.

Virtual Online Live Training

ONLIVE LIVE

Our Virtual Instructor Led classes allow you to interact with a live instructor, as well as your peers in class – all from the comfort of home or your office. 

We utilize leading edge enterprise videoconferencing technology with breakout rooms and more!

Instructor Led Training

INSTRUCTOR LED

The statistics prove that successful learning, retention and certification most often results from instructor-led training. 

We have award-winning instructors and nothing beats sitting in class with them live and in person!  Com and join us in person today!

On Demand Training

ONLINE ON DEMAND

In need complete flexibility and access 24 hours a day?  We offer online classes that you can view at your leisure, all taught by our award-winning instructor team!

Our On Demand resources are premier studio quality classes with consistent updated course content!

Client Testimonials

Be wary of companies that pay external vendors to farm and post reviews, many of them are not authentic. Ours come straight from Google, you can’t alter reviews on Google Maps in any way. Don’t take our word for who we are – hear from our clients:

5 Star Reviews

Looking for Malware Reverse Engineering Training Program?

We welcome the opportunity to talk through your individual training needs, or that of your team. Please reach out to us with any questions you might have.  And no, we will not relentlessly hound you with sales calls, we promise!  We are a no pressure, service oriented company.

Reach out – you’ll be glad you did!