Malware Reverse Engineering

This learning path will enable you to identify malware types, characteristics and behaviors. You will be able to detect, analyze and mitigate malware from any network.


  • Reverse engineering Skill Assessment

    20 questions

    • See how your reverse engineering skills rank on a spectrum from novice to expert.

  • Malware Analysis Introduction

    5 videos

    K0183, K0184, K0188, K0189, K0259, K0479, K0480, S0003, S0087, S0131

    • This course is the student’s introduction to reverse engineering and malware.

  • Basic Static Analysis

    7 videos

    K0175, K0183, K0188, K0189, K0259, K0479, K0480, S0003, S0087, S0131, S0270

    • Learn how to conduct basic static analysis on a malicious file to gather information about the malware prior to conducting any dynamic analysis.

  • Advanced Static Analysis

    6 videos

    K0175, K0183, K0188, K0189, K0259, K0479, K0480, S0003, S0087, S0131, S0270

    • In this course, you’ll explore advanced static analysis.

  • Basic Dynamic Analysis

    6 videos

    K0175, K0183, K0188, K0189, K0259, K0479, K0480, S0003, S0087, S0131, S0270

    • In this course, you’ll get to grips with malware and basic dynamic analysis.

  • Advanced Dynamic Analysis

    8 videos

    K0175, K0183, K0188, K0189, K0259, K0479, K0480, S0003, S0087, S0131, S0270

    • This course will help the student get to grips with advanced dynamic analysis.e.

  • Reporting and Mitigation

    3 videos

    K0315, K0354 K0355, K0451, K0468, S0003

    • In this course the student will explore reporting, mitigation techniques and demonstrating mitigation.

  • Reverse Engineering Project

    5 tasks

    • Now that you have all the necessary skills required to reverse engineer, put those skills to the test! This project involves utilizing skills you’ve learned to analyze a real-world malware sample with five challenges to complete.

The subject

What you will learn

In this path, you will learn about the various techniques used by malware to persist, propagate, disrupt, modify and enumerate infected hosts and networks. This path will prepare you to statically and dynamically analyze malware, as well as document the analysis. It will also provide you with the skills to properly mitigate the malware intrusion. You will be able to apply these skills toward real-world security incidents and computer intrusions causes by malware.

The details

Learning path insights


This learning path is recommended for cybersecurity professionals that are familiar with using Linux operating environments, general core programming concepts, Operating Systems Concepts and fundamentals of networking — along with 3-5 years of cybersecurity experience or comparable education.

Related job titles

  • Network operations specialist
  • Vulnerability assessment analyst
  • Target network analyst
  • Malware analyst
  • Cyber reverse engineer

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your 10.75 CPEs or CPUs.


Meet the author

Carolyn has been a malware reverse engineer for over nine years. She initially gained her reverse-engineering skill set in the US Navy, conducting malware analysis for defensive purposes, incident response and enabling exploitation operations. She is proficient at analyzing various types of binaries and working with many malware analysis tools and programming languages such as x86 assembly, C, C++ and Python. She also has three years’ experience as a computer forensic analyst conducting analysis on various media devices in search of malicious intrusions. <br><br> Carolyn has taken numerous malware reverse-engineering courses, at levels from beginner to advanced. She has also created numerous malware analysis training pipelines. She has her Bachelor of Science degree in computer networks and cybersecurity from the University of Maryland Global Campus, and has been SANS GIAC Reverse Engineering Malware (GREM)-certified since 2015.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Security Architect
  • System Administrator
  • Systems Security Analyst
  • Threat/Warning Analyst

Plans & pricing

  • Infosec Skills Personal

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free reverse engineering training

  • 1,200+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Related Learning

You might also be interested in

CompTIA Network+

The CompTIA Network+ learning path teaches you how to design, configure, troubleshoot and manage network devices. You'll learn about implementing networking concepts and using best practices to support and secure devices.

Vulnerability Assessment

The vulnerability assessment learning path guides you through a holistic security assessment approach, where you will develop a well-structured framework for analyzing the security of a system. You will acquire the skills to perform custom vulnerability assessment for any computer system, application or network infrastructure.

Network Traffic Analysis for Incident Response

Learn about network traffic analysis tools and techniques and the valuable data that can be extracted from your network traffic.


The CompTIA Advanced Security Practitioner (CASP+) certification path prepares your for CompTIA's most prestigious information security certification. You'll learn the skills required to conceptualize, design and engineer secure solutions across complex enterprise environments.

Cybersecurity Administration

The Cybersecurity Administration skill path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

CertNexus CyberSec First Responder

This learning path is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-310) certification examination. It provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

What your peers are saying about Infosec Skills

Infosec Skills reviews sourced by G2