Advanced Reverse Engineering Online Training

This is a follow-up course to our Reverse Engineering Boot Camp and is the only place to study advanced malware at this level. You’ll work in complex labs with some of the most complex malware available.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Advanced Reverse Engineering Online Course Overview

Do you already have experience reverse engineering? Need to take your reversing skills to the next level? InfoSec Institute’s Advanced Reverse Engineering course is an in-depth, hands-on, high-level malware reversing course ready help you increase your skill level.

In Advanced Reverse Engineering Malware, you will learn all of the latest techniques for reversing malware:

  • Learn to reverse malware that utilizes multiple overlapping obfuscation techniques in both user and kernel space.
  • Gain hands-on training for reversing binary and/or obfuscated Command and Control (C&C) communication protocols.
  • Train on the various specialized tools and IDA plugins that make reversing complex malware possible.

Because modern malware makes use of sophisticated obfuscation techniques, you need to have specific reversing skills in the deconstruction of various x86 assembler obfuscation tricks used by malware in order to be an expert malware reverser. This four-day course bridges the gap between reversing “vanilla” compiler generated code and the nontrivial, complex code created by expert malware authors.

Modern malware typically is developed with some measure of Command and Control (C&C) communication capabilities. The C&C protocol can used to maintain a botnet, deliver package updates, send commands, and steal data from compromised machines. Understanding and reversing the underlying C&C protocol is essential to understanding the intention, functionality, and potentially the identity of the malware author. In the Advanced Reverse Engineering Malware course, you will learn how to reverse these C&C protocols from live malware examples that are currently in circulation.

Reversing obfuscated malware in some cases must be done programmatically. This requires you to understand how to use specialized plugins for IDA as well as other malware-specific tools in order to de-obfuscate various portions of the code under analysis. In other cases, hours or days of manual work can be saved by learning the proper use of a specific reversing tool. InfoSec Institute will teach you how to use these important tools in a series of hands-on labs during this course.

How You’ll Benefit:

  • Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts or vulnerability researchers have the ability to reverse malware efficiently. You will undoubtedly be at the top of your professional field.
  • Learn the methodologies, tools, and manual malware reversing techniques used real world situations in our reversing lab.
  • Move beyond automated “sandbox” testing of malware.
  • More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

Advanced Reverse Engineering Malware Online Training

Rated 4.6/5 based on 5 customer reviews

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Award-Winning Training

What You'll LEARN

    Some of the reverse engineering concepts you will learn to master during this course…

    • IDA configuration for programmatic reversing and script writing
    • IDA Plugin architecture and setup
    • The Windows Kernel
    • Understanding the Kernel API used by malware authors
    • Overview of common rootkit technologies
    • Using WinDBG for kernel debugging
    • PE Anti-reversing techniques: De-obfuscating executables for IDA
    • Obfuscation: User-mode obfuscation methods
    • Anti-RE Techniques: Detecting debuggers, virtual machines, and other tricks
    • Kernel assisted obfuscation
    • Understanding rootkit process / DLL injection
    • Understanding rootkit process / DLL injection
    • Reversing kernel-mode botnet bots
    • Study of Metasploit’s Shikata Ga Nai
    • Automated unpacking systems
    • Utilizing Saffron and Ether
    • Analyzing physical memory with Memoryze
    • Identifying common algorithms inside worms
    • Virtual Machine based packers
    • Reversing Themida and other VM packers
    • Reversing mangled UPX and other compression types
    • Protocol Reversing (Reversing Storm’s user mode code)
    • Reverse storm’s C&C protocol
    • Reversing .NET byte code
    • CEREA Review

    Certifications & Compliance

    CEREA: Certified Expert Reverse Engineering Analyst

    In any hands-on reverse engineer training course, it’s important to have the opportunity to prove your skill level to current or potential employers. This course prepares you for the top reverse engineering certification in the industry, the CEREA. The exam is given at the end of the course, InfoSec Institute has achieved a 93% pass rate for this certification.

    Book your course

      What Our Students Are Saying

      Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
      JH

      John Hollan GE

      Advanced Ethical Hacking Training Boot Camp

      Career Tracks

      • Critical Infrastructure Track

      • Hacker Track

        The InfoSec Institute Hacker Track will take you from 0 to 60 in your security career. By the time you successfully complete this track you will be highly credential-ed and in the top 5-10% of hackers in the world.
      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing