Advanced Reverse Engineering Malware Training Boot Camp

Way more than theories. Get into our reversing lab and experience the most in-depth,hands-on advanced-level malware reversing course in the industry!

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Analysts Recommended

IDC lists Infosec as Major Player in their Security Training Vendor Assessment.

Advanced Reverse Engineering Course Overview

Already have experience reverse engineering? Need to take your reversing skills to the next level? Infosec’s Advanced Reverse Engineering Reverse Malware course is the most in-depth,hands-on advanced-level malware reversing course in the industry!

In Advanced Reverse Engineering Malware, you will learn all of the latest techniques for reversing malware:

  • Learn to reverse malware that utilizes multiple overlapping obfuscation techniques in both user and kernel space.
  • Gain hands-on training for reversing binary and/or obfuscated Command and Control (C&C)communication protocols.
  • Train on the various specialized tools and IDA plugins that make reversing complex malware possible.

Because modern malware makes use of sophisticated obfuscation techniques, you need to havespecific reversing skills in the deconstruction of various x86 assembler obfuscation tricks used by malware in order to be an expert malware reverser. This four day course bridges the gap between reversing “vanilla” compiler generated code and the nontrivial, complex code created by expert malware authors.

Modern malware typically is developed with some measure of Command and Control (C&C)communication capabilities. The C&C protocol can used to maintain a botnet, deliver package updates, send commands, and steal data from compromised machines. Understanding and reversing the underlying C&C protocol is essential to understanding the intention, functionality, and potentially the identity of the malware author. In the Advanced Reverse Engineering Malware course, you will learn how to reverse these C&C protocols from live malware examples that are currently in circulation.

Reversing obfuscated malware in some cases must be done programmatically. This requires you to understand how to use specialized plugins for IDA as well as other malware-specific tools in order to de-obsfucate various portions of the code under analysis. In other cases, hours or days of manual work can be saved by learning the proper use of a specific reversing tool. Infosec will teach you how to use these important tools in a series of hands-on labs during this course.


  • Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse malware efficiently. You will undoubtedly be at the top of your professional field.
  • Learn the methodologies, tools, and manual malware reversing techniques used real world situations in our reversing lab.
  • Move beyond automated “sandbox” testing of malware.
  • More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

Learn from Advanced Reversing Experts:

All of the instructors for Infosec’s Advanced Reverse Engineering Malware course active work in the field of reverse engineering or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.

CEREA: Certified Expert Reverse Engineering Analyst

In any hands on reverse engineer training course, it is important to have the opportunity to prove to current or potential employers that you have the skills you say you do. This course prepares you for the top reverse engineering certification in the industry, the CEREA. The exam is given on-site, Infosec has achieved a 91% pass rate for this certification.


  • Firm understanding of the Windows Operating System
  • Firm understanding of computer architecture concepts
  • Grasp of the TCP/IP protocols
  • Experience with Reverse Engineering or current CREA certification holder

If you are unsure if you meet the required prerequisites, contact us for a quick network security training skill check.

Advanced Reverse Engineering Malware Boot Camp

Rated 4.6/5 based on 5 customer reviews

Award-winning training that you can trust.

G2 Crowd High Performer

Technical Skills Development Software

Outstanding Partnership Award

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

What You'll LEARN & DO

    Some of the reverse engineering concepts you will learn to master during this course…

    • IDA configuration for programmatic reversing and script writing
    • IDA Plugin architecture and setup
    • The Windows Kernel
    • Understanding the Kernel API used by malware authors
    • Overview of common rootkit technologies
    • Using WinDBG for kernel debugging
    • PE Anti-reversing techniques: De-obfuscating executables for IDA
    • Obfuscation: User-mode obfuscation methods
    • Anti-RE Techniques: Detecting debuggers, virtual machines, and other tricks
    • Kernel assisted obfuscation
    • Understanding rootkit process / DLL injection
    • Understanding rootkit process / DLL injection
    • Reversing kernel-mode botnet bots
    • Study of Metasploit’s Shikata-ga-nai
    • Automated unpacking systems
    • Utilizing Saffron and Ether
    • Analyzing physical memory with memoryze
    • Identifying common algorithms inside worms
    • Virtual Machine based packers
    • Reversing Themida and other VM packers
    • Reversing mangled UPX and other compression types
    • Protocol Reversing (Reversing Storm’s usermode code)
    • Reverse storm’s C&C protocol
    • Reversing .NET byte code
    • CEREA Review

    Our Major Clients

    Book your course

      What Our Students Are Saying

      The class was entertaining and light but kept to the purpose of the class, which was to apply tools and techniques that we could take back to our jobs. I was teasing the instructor about trying to fail the test so I could take his class again. I passed ;0(

      F. Wade Cullison Wade Cullison

      Advanced Reverse Engineering Malware Training Boot Camp

      Career Tracks

      • Computer Forensics Investigator

        A Computer Forensics Investigator or Forensic Analyst is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers.
      • Malware Analyst & Vulnerability Researcher

      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing