In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.
56 Lessons | Community access
Gain practical experience through hands-on labs and real-world case studies, allowing you to apply theoretical knowledge to practical scenarios. Develop the confidence and proficiency to analyze and combat various types of malware effectively.
Receive personalized support from our team of experienced instructors who are dedicated to your success. Get answers to your questions, guidance on challenging concepts, and tailored feedback to help you excel in your studies.
Cybersecurity researcher and red teamer who lives both on the offensive and defensive fronts. The author of the “Antivirus Bypass Techniques”, “Malware Analysis On Steroids” books, expert in malware research, reverse engineering, penetration testing, digital forensics, and incident response.
Learn practical techniques and tactics to combat, bypass, and evade antivirus software Enroll in this course and receive a 30% discount on the best-seller Antivirus Bypass Techniques book.
Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.
Contact us to receive more affordable personal pricing.
Malware Analyst Professional – Level 1 is a hands-on journey from “sample received” to crystal-clear intelligence. Across six tightly sequenced modules, you will build a safe Flare-VM lab, compile and reverse C programs, decode PE headers, master rapid static triage and unpacking, capture every runtime artefact with Process Explorer, Procmon, and live debugging, and finally dissect real-world document exploits and VBA macros. Each step pairs theory with guided labs, culminating in a full static + dynamic analysis of the FlawedAmmyy RAT and custom YARA rules you can deploy the same day. Whether you’re aiming for SOC enrichment, incident response, or threat-research roles, this course equips you with repeatable workflows and open-source tooling to turn unknown binaries into actionable detection and defensive insight.
Malware rarely ships with source code, yet knowing what typical C constructs look like in a disassembler is the analyst’s first superpower. In this module, you install a properly tooled Visual Studio, review the compile-link-load-runtime pipeline, and write a simple program while playing with some compiler options to see how each flag reshapes the PE file. Then you flip perspectives: load the freshly built binary into IDA/Ghidra, trace its functions, and correlate assembly patterns back to their C origins. By the end, you’ll grasp how everyday coding choices surface in machine code, knowledge that lets you recognise, label, and reason about unknown malware far faster in later modules.
Every Windows binary, benign or malicious, travels as a Portable Executable. This module equips you to read that blueprint like a map. You’ll learn the hierarchy of headers that the OS loader trusts, follow RVAs to real bytes on disk, and inspect the import, export, and other intricate parts of the PE file format that reveal a program’s intentions. Finally, you’ll contrast EXE and DLL flavours so you can spot masquerading tricks attackers love. With this knowledge, any sample you meet later in the course will feel less like a black box and more like a well-labelled puzzle you already know how to solve.
Here you can download all the relevant samples so you can reproduce the analysis steps with me together.
Here you can download all the relevant samples so you can reproduce the analysis steps with me together.
56 Lessons | Community Access
In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.
@2025 TrainSec. All rights reserved. Terms of Use | Privacy Policy