Main Menu
My Infosec
Main Menu
My Infosec

Reverse Engineering Malware Training Boot Camp

Reverse Engineering is a critical skill. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. By taking part in this boot camp, you will undoubtedly be at the top of your professional field.

Award Winning Training

InfoSec is one of the most awarded and trusted information security training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Live Online students.

Analyst Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Reverse Engineering Course Overview

Reverse engineering is a vitally important skill for today’s expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries is required in order to properly secure an organization from today’s ever evolving threats.In this five day hands-on course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. You will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:

  • Hostile Code & Malware, including: Worms, viruses, trojans, rootkits and bots .
  • Vulnerabilities in Binaries, including: Format string vulnerabilities, buffer overflow conditions, and the identification of flawed cryptographic schemes
  • Business Intelligence, used by: Hackers, trojan writers and copy protection algorithms

Additionally you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET. InfoSec Institute will train you on the standard reverse engineering programs IDA Pro,Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.


  • Gain the in-demand career skills of a reverse engineer.
  • Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.
  • Move beyond automated “input and output” testing of binaries, commonly used by fuzzers and other analysis tools.
  • More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

Learn from Advanced Reversing Experts: All of the instructors for InfoSec Institute’s Reverse Engineering course actively work in the field of incident response or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.


  • Firm understanding of the Windows Operating System
  • Firm understanding of computer architecture concepts
  • Grasp of the TCP/IP protocols

If you are unsure if you meet the required prerequisites, contact us for a quick network security training skill check.

Reverse Engineering Boot Camp

Rated 4.9/5 based on 9 customer reviews

Award-Winning Training

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

What You'll LEARN

Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering. Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them. Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.

  • Understanding hashing functions
  • Working with encrypted binaries
  • Reversing UPX and other compression types
  • Discovering stack overflows
  • Discovering heap overflows
  • Creating a sandbox to isolate malware
  • Unpacking malware
  • Monitoring registry changes
  • Identifying malware communication channels
  • Understanding Digital Rights Management (DRM) implementations

What You'll DO

  • Thwart anti-debugger code

  • Learn about memory management

  • Debug multi-threaded programs

  • Work with recursive traversal dissasemblers

  • Reverse .NET bytecode

  • CREA review

  • Learn about legal issues and the DMCA

  • Understand conditional branching statements

  • Learn about Win32 executable formats and image sections

  • Use virtual machines and bytecode

  • Learn the fundamentals of IDA Pro

  • Learn system vs. code Level reversing

  • Identify variables

  • Learn advanced uses of IDA Pro with hostile code

  • Use Ollydbg for runtime analysis of malware

  • Use Kernel mode debugging with SoftICE

  • Dump executables from memory with Dumpbin

  • Learn about compilers and branch prediction

  • Locate undocumented APIs

  • Reverse ntdll.dll

  • Lear obfuscation of file formats

Book your course

    Our Major Clients

    What Our Students Are Saying

    The material was very good, labs were content rich and explained what was going on when necessary. The instructor provided an excellent learning environment tying in his vast experience with the massive amount of material. He also knew when to take a break from material when our heads were spinning to let us absorb what we were taking in.

    Timothy Fries ICF International - Corporate Parent

    Reverse Engineering Malware Training Boot Camp

    Frequently Asked Questions

    Why is getting certified an important part of a Malware Analyst’s career?

    Obtaining a certification like the CREA demonstrates that you are a knowledgeable security professional, dedicated to standing out among your peers. Reverse Engineering positions are highly technical, and becoming certified establishes a base-line of credibility to your resume that will help you stand out when applying for positions.

    What career opportunities are presented to graduates of this Reverse Engineering Malware boot camp?

    Malware Analysts are one of the fastest growing careers in the tech industry. As commerce in the United States continues its shift to digitization, businesses have recognized the need to keep their systems safe from cyber threats. As this shift continues to progress, the need for certified malware analysts has continued to rise.

    What does this Reverse Engineering training course offer that other training programs do not?

    InfoSec Institute has provided award-winning training to students for nearly twenty years, and our Training Boot Camp participants have the highest exam pass rate in the industry at 94%! Our small class sizes offer you intimate training with the most skilled professionals in the field, who you’ll get the opportunity to get one-on-one feedback from on any itching questions you might have.

    What are the Pre-Requirements for the Reverse Engineering Malware boot camp?

    We require our students have a firm understanding of the Windows Operating System, computer architecture concepts, and a grasp of the TCP/IP protocols. If you are unsure if you meet these prerequisites, contact us and we can give you a brief network security training skill check.

    What material is covered in this course?

    We cover all of the exam material that you will encounter on the CREA, which is the premier reverse engineering certification in the industry. You’ll learn how to unpack malware, work with encrypted binaries, understand hashing functions, monitor registry changes, create sandbox environments to isolate malware, and a host of other skills.

    Is the online Reverse Engineering Boot Camp as effective and informative as an in-person training session?

    We take great care to make sure our online students receive the same benefits and training as our in-person participants. On top of that, we offer our students an Exam Pass Guarantee, so that you can focus all your energy on course material without worrying about exam pass rates!

    How does the CREA compare to other security certifications?

    The CREA is more focused on practical and conceptual knowledge of reverse engineering, with both theoretical and hands-on portions on the exam. Other certifications like the GREM tend to be more expensive and are focused around analysis of malware samples.

    Why is this Reverse Engineering Boot Camp a necessary addition to the other popular certification programs?

    At InfoSec Institute we take a unique approach to our training in that we’ve adopted a Boot Camp style. This consists of five days of intensive, hands-on instruction from the most skilled malware analysts in the industry. Our program can be completed either online or in-person—whichever style fits your schedule better!

    What tools do I need to attend the training session?

    All of the tools you need to attend the course will be provided.

    Is an exam voucher included with the purchase of this course?

    Yes! Exam vouchers are included with every purchase of an InfoSec Institute Training Boot Camp.

    What are some tips for preparing for the CREA certification?

    Our #1 tip for CREA candidates is to enroll in a Training Boot Camp like the one offered here. InfoSec Institute’s award-winning training has helped students become certified for nearly twenty years, and with an exam pass rate of 94%, our students have the highest in the industry! Other tips for success include gaining as much hands-on experience as you can reverse engineering malware, and going over the sample practical examinations provided by IACRB.

    What’s the job outlook for Malware Analysts?

    As of recent years, the job market for Malware Analysts is booming. Other common job titles for CREA holders include: reverse engineer, cyber security researcher, threat analyst, as well as many others. Click here and navigate to the Job Titles section for more detailed information.

    What is the average salary for a Malware Analyst?

    No matter what career you’re in, salary data depends on factors including job title, years of experience, and location. That said, the average annual salary of a Malware Analyst is around $80,000. (Click here for more salary data about Malware Analysts specifically.) Data for CREA-holders in general tends to average out at around $84,000, which you can read more about by clicking here.

    Certification & Compliance

    Certified Reverse Engineering Analyst:

    In any hands on reverse engineer training course, it’s important to have the opportunity to prove, to current or potential employers, that you have the skills you claim you do. This course prepares you for the premier reverse engineering certification in the industry, the CREA. The exam is given on-site and InfoSec Institute has achieved a 93% pass rate for this certification.

    You’ll also get:

    FREE tools and software!

    • InfoSec Institute’s Custom Reversing Tools Enterprise Suite, including every program covered in the course, for at home study. (119 Tools).

    Course Materials, Test Fees and Class Guarantees!

    • The small class size provides an intimate learning setting not offered at any of our competitors. Five full days of boot camp style training — our instructors teach from 8am to 10:30pm every day. The course runs from 8am to 5pm daily with optional ethical capture the flag exercises to 10:30pm. All meals, snacks and refreshments are included. (Snacks not included in Las Vegas courses.) Also included are the exam fees, lectures, lab exercises and text book.

    Available as a PACKAGE

    • This course is available back-to-back as a package with Advanced Ethical Hacking and/or Computer Forensics Training. Call us for discounts and pricing. Tuition Includes: Five days of expert training, three daily meals, text book, course book, lab manual, snacks, and appropriate certification voucher)

    Career Tracks

    • Computer Forensics Investigator

      A Computer Forensics Investigator or Forensic Analyst is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers.
    • Malware Analyst & Vulnerability Researcher

    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing