Advanced Reverse Engineering Malware Boot Camp

Way more than theories. Get into our reversing lab and experience the most in-depth,hands-on advanced-level malware reversing course in the industry!

or call us on (866)-471-0059

Advanced Reverse Engineering Course Overview

Already have experience reverse engineering? Need to take your reversing skills to the next level? InfoSec Institute’s Advanced Reverse Engineering Reverse Malware course is the most in-depth,hands-on advanced-level malware reversing course in the industry!

In Advanced Reverse Engineering Malware, you will learn all of the latest techniques for reversing malware:

Because modern malware makes use of sophisticated obfuscation techniques, you need to havespecific reversing skills in the deconstruction of various x86 assembler obfuscation tricks used by malware in order to be an expert malware reverser. This four day course bridges the gap between reversing “vanilla” compiler generated code and the nontrivial, complex code created by expert malware authors.

Modern malware typically is developed with some measure of Command and Control (C&C)communication capabilities. The C&C protocol can used to maintain a botnet, deliver package updates, send commands, and steal data from compromised machines. Understanding and reversing the underlying C&C protocol is essential to understanding the intention, functionality, and potentially the identity of the malware author. In the Advanced Reverse Engineering Malware course, you will learn how to reverse these C&C protocols from live malware examples that are currently in circulation.

Reversing obfuscated malware in some cases must be done programmatically. This requires you to understand how to use specialized plugins for IDA as well as other malware-specific tools in order to de-obsfucate various portions of the code under analysis. In other cases, hours or days of manual work can be saved by learning the proper use of a specific reversing tool. InfoSec Institute will teach you how to use these important tools in a series of hands-on labs during this course.

HOW YOU’LL BENEFIT:

Learn from Advanced Reversing Experts:

All of the instructors for InfoSec Institute’s Advanced Reverse Engineering Malware course active work in the field of reverse engineering or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.

CEREA: Certified Expert Reverse Engineering Analyst

In any hands on reverse engineer training course, it is important to have the opportunity to prove to current or potential employers that you have the skills you say you do. This course prepares you for the top reverse engineering certification in the industry, the CEREA. The exam is given on-site, InfoSec Institute has achieved a 91% pass rate for this certification.

Prerequisites:

If you are unsure if you meet the required prerequisites, contact us for a quick network security training skill check.

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

View Price Now

What You'll LEARN & DO

Some of the reverse engineering concepts you will learn to master during this course…

  • IDA configuration for programmatic reversing and script writing
  • IDA Plugin architecture and setup
  • The Windows Kernel
  • Understanding the Kernel API used by malware authors
  • Overview of common rootkit technologies
  • Using WinDBG for kernel debugging
  • PE Anti-reversing techniques: De-obfuscating executables for IDA
  • Obfuscation: User-mode obfuscation methods
  • Anti-RE Techniques: Detecting debuggers, virtual machines, and other tricks
  • Kernel assisted obfuscation
  • Understanding rootkit process / DLL injection
  • Understanding rootkit process / DLL injection
  • Reversing kernel-mode botnet bots
  • Study of Metasploit’s Shikata-ga-nai
  • Automated unpacking systems
  • Utilizing Saffron and Ether
  • Analyzing physical memory with memoryze
  • Identifying common algorithms inside worms
  • Virtual Machine based packers
  • Reversing Themida and other VM packers
  • Reversing mangled UPX and other compression types
  • Protocol Reversing (Reversing Storm’s usermode code)
  • Reverse storm’s C&C protocol
  • Reversing .NET byte code
  • CEREA Review

Interested in training?

You can register your interest and we’ll keep you up to date when public courses become available. You can also register your interest in on-site training.

Thanks! We’ll keep you updated
As soon as we have news of the status of this course, we’ll be in touch.
  • or call us on (866)-471-0059

These people loved our Advanced Reverse Engineering Malware Boot Camp course

Advanced Reverse Engineering Malware Boot Camp is part of these career tracks

New Exam Pass Guarantee!

Our new Live Online format has produced excellent results. We trust the course quality will help you pass on your first exam attempt and this exam-pass guarantee backs up that trust.

New Exam Pass Guarantee!

Our new Live Online format has produced excellent results. We trust the course quality will help you pass on your first exam attempt and this exam-pass guarantee backs up that trust.