Reverse Engineering Malware Training Boot Camp

Reverse Engineering is a critical skill. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. By taking part in this boot camp, you will undoubtedly be at the top of your professional field.

Award-Winning Training

For 20 years InfoSec has been one of the most awarded and trusted information security training vendors — 40+ industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Analyst Recommended

IDC lists Infosec as Major Player in their Security Training Vendor Assessment.

Reverse Engineering Course Overview

Reverse engineering is a vitally important skill for today’s expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries is required in order to properly secure an organization from today’s ever evolving threats.In this five day hands-on course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. You will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:

  • Hostile Code & Malware, including: Worms, viruses, trojans, rootkits and bots .
  • Vulnerabilities in Binaries, including: Format string vulnerabilities, buffer overflow conditions, and the identification of flawed cryptographic schemes
  • Business Intelligence, used by: Hackers, trojan writers and copy protection algorithms

Additionally you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET. Infosec will train you on the standard reverse engineering programs IDA Pro,Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.


  • Gain the in-demand career skills of a reverse engineer.
  • Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.
  • Move beyond automated “input and output” testing of binaries, commonly used by fuzzers and other analysis tools.
  • More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

Learn from Advanced Reversing Experts: All of the instructors for Infosec’s Reverse Engineering course actively work in the field of incident response or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.


  • Firm understanding of the Windows Operating System
  • Firm understanding of computer architecture concepts
  • Grasp of the TCP/IP protocols

If you are unsure if you meet the required prerequisites, contact us for a quick network security training skill check.

Award-winning training that you can trust.

Outstanding Partnership Award

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

Watch List Company

Top Online Learning Library

The Most Flexible Training — Guaranteed

Exam Pass Guarantee — If you don’t pass your exam on the first attempt, get a second attempt for free; includes the ability to re-sit the course for free for up to one year

100% Satisfaction Guarantee — If you’re not 100% satisfied with your training at the end of the first day, you may enroll in a different Flex Pro or Flex Classroom course

Knowledge Transfer Guarantee — If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year

What You'll LEARN

Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering. Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them. Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.

  • Understanding hashing functions
  • Working with encrypted binaries
  • Reversing UPX and other compression types
  • Discovering stack overflows
  • Discovering heap overflows
  • Creating a sandbox to isolate malware
  • Unpacking malware
  • Monitoring registry changes
  • Identifying malware communication channels
  • Understanding Digital Rights Management (DRM) implementations

What You'll DO

  • Thwart anti-debugger code

  • Learn about memory management

  • Debug multi-threaded programs

  • Work with recursive traversal dissasemblers

  • Reverse .NET bytecode

  • CREA review

  • Learn about legal issues and the DMCA

  • Understand conditional branching statements

  • Learn about Win32 executable formats and image sections

  • Use virtual machines and bytecode

  • Learn the fundamentals of IDA Pro

  • Learn system vs. code Level reversing

  • Identify variables

  • Learn advanced uses of IDA Pro with hostile code

  • Use Ollydbg for runtime analysis of malware

  • Use Kernel mode debugging with SoftICE

  • Dump executables from memory with Dumpbin

  • Learn about compilers and branch prediction

  • Locate undocumented APIs

  • Reverse ntdll.dll

  • Lear obfuscation of file formats

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Our Major Clients

Book your course

    What Our Students Are Saying

    The material was very good, labs were content rich and explained what was going on when necessary. The instructor provided an excellent learning environment tying in his vast experience with the massive amount of material. He also knew when to take a break from material when our heads were spinning to let us absorb what we were taking in.

    Timothy Fries ICF International - Corporate Parent

    Reverse Engineering Malware Training Boot Camp

    Certification & Compliance

    Certified Reverse Engineering Analyst:

    In any hands on reverse engineer training course, it’s important to have the opportunity to prove, to current or potential employers, that you have the skills you claim you do. This course prepares you for the premier reverse engineering certification in the industry, the CREA. The exam is given on-site and Infosec has achieved a 93% pass rate for this certification.

    You’ll also get:

    FREE tools and software!

    • Infosec’s Custom Reversing Tools Enterprise Suite, including every program covered in the course, for at home study. (119 Tools).

    Course Materials, Test Fees and Class Guarantees!

    • The small class size provides an intimate learning setting not offered at any of our competitors. Five full days of boot camp style training — our instructors teach from 8am to 10:30pm every day. The course runs from 8am to 5pm daily with optional ethical capture the flag exercises to 10:30pm. All meals, snacks and refreshments are included. (Snacks not included in Las Vegas courses.) Also included are the exam fees, lectures, lab exercises and text book.

    Available as a PACKAGE

    • This course is available back-to-back as a package with Advanced Ethical Hacking and/or Computer Forensics Training. Call us for discounts and pricing. Tuition Includes: Five days of expert training, three daily meals, text book, course book, lab manual, snacks, and appropriate certification voucher)

    Career Tracks

    • Computer Forensics Investigator

      A Computer Forensics Investigator or Forensic Analyst is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers.
    • Malware Analyst & Vulnerability Researcher

    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing