The Windows Security Researcher path provides the necessary knowledge, understanding, and tools to be a successful Windows OS researcher, and malware analyst and reverse engineer.
$1408
or $113 X 10 payments
68+ hours
on-demand video
Assignments
In class assignments
400+
Articles & lessons
12+
downloadable resources
Cross-device
Access on mobile & TV
Certification
Certificate of completion
Windows is the most used OS in the world, and thus is a favored target of malicious actors. Researching and finding OS vulnerabilities, dissecting viruses, worms, and other malicious entities is critically important in today’s security landscape. This path provides the necessary knowledge and understanding to allow research and reverse engineering of the OS and malicious payloads.
Our trainers are seasoned industry-insiders with a deep, practical understanding of cybersecurity research and development
Software developer, trainer, consultant, author, and speaker. Co-author of “Windows Internals” 7th edition (2017). Author of “Windows Kernel Programming, 2nd ed” (2023), “Windows 10 System Programming Part 1” (2020) and Part 2 (2021).
Security researcher, consultant, and the author of the Antivirus Bypass Techniques book who lives both on the offensive and defensive fronts. Passionate about malware research, and red teaming while providing real-world security solutions.
This course provides the fundamental knowledge of Windows concepts and architecture, including processes, threads, virtual memory, system calls, DLLs, handles and objects. This will serve as a good foundation for the following courses which focus on programming.
This course continues where Day 1 left off, digging deeper into processes – process creation and destruction, types of processes and more. Job objects are also described, including their extension called Silos that is the basis of Windows container implementation. Finally, threads are discussed, including scheduling and management.
The last “day” in the Windows Internals series deals with two topics. The I/O system is described, including the use of device drivers, and their integration into the system as whole. Then many security mechanisms are discussed, from access tokens, security descriptors, to access checks and integrity levels, among others.
This course teaches the basics of the x86/x64 assembly language from the ground up. It focuses on integrating it into C/C++ applications, but also shows how to write stand alone applications with assembly only.
This course dives into the WinDbg debugger, and how to effectively use it in user mode and kernel mode debugging, as well as the analysis of kernel mode dump files.
In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win against any malware coming your way.
In this level 2 course, we will continue to dive into the profound and inner levels of the art of malware dissection and reverse engineering. You will learn about advanced malware evasion, privilege escalation, lateral movement, process injection and hooking techniques, shellcode analysis, advanced static and dynamic analysis techniques while analyzing sophisticated ransomware, info stealers and spyware families.
Contact us to get even more access and individual discounts.
Yes, at least reading knowledge of C is required.
No, for the most part. That being said, it’s useful to know the basics of C++, such as classes, methods, inheritance, and polymorphism.
No, the necessary parts will be covered. However, any prior exposure to these tools is beneficial.
“if you are looking to learn a high income skill or maybe you want to quit your job then learning this is critical. It is the highlight of my career.”
Kyle C.
“if you are looking to learn a high income skill or maybe you want to quit your job then learning this is critical. It is the highlight of my career.”
Mario T.
“if you are looking to learn a high income skill or maybe you want to quit your job then learning this is critical. It is the highlight of my career.”
Lucy C.
Join our blog and community for free resources and personal connections.
@2024 TrainSec. All rights reserved. Terms of Use | Privacy Policy
For a limited time, enjoy 25% off ALL available courses for the next month. Whether you’re looking to sharpen your skills or explore new areas of cybersecurity, now’s the perfect time to invest in your growth.
Use code BFRIDAY24 at checkout to claim your discount.