Study any time, from any device.

Learn Malware Analysis and Reverse Engineering

The Malware Analysis and Reverse Engineering skill path teaches you the fundamentals of reverse engineering malware, including anti-reversing techniques.

12 courses  //   75 videos  //   7 hours of training

Malware Analysis & Reverse Engineering training

This learning path takes a deep dive into taking apart and analyzing malware. As you progress through 12 courses, you’ll build your skills and knowledge around the inner-workings of malware, the tools used by malware analysts, and the ins and outs of reversing different types of malware. Upon completion, you’ll have the reverse engineering skills necessary to understand, dissect and analyze malware.

Learning path components

Disassembly
Course
Disassembly

Disassembly

Examine the intricacies of assembly and disassembly in an X86 context. Includes videos on arithmetic instructions, logical instructions and operands.

8 videos
48 minutes of training

Reversing Tools
Course
Reversing Tools

Reversing Tools

Explore the intricacies of multiple reversing tools, beginning with a close look at Interactive Dissasembler (IDA).

2 videos
33 minutes of training

C Code in Assembly
Course
C Code in Assembly

C Code in Assembly

Take a closer look at C code in assembly, including loops, linked lists, stacks and heaps.

6 videos
48 minutes of training

Windows Internals
Course
Windows Internals

Windows Internals

Explore the reverse-engineering of Windows with this course on Windows internals such as network APIs and services.

6 videos
34 minutes of training

Debugging
Course
Debugging

Debugging

A close and personal look at debugging, with nine videos taking you through stepping, breakpoints and exceptions and more. Includes in-depth examples.

9 videos
41 minutes of training

Common Malware Behavior
Course
Common Malware Behavior

Common Malware Behavior

Improve your malware-hunting skills with a course on injection types, network functions and other fundamentals of malware behavior.

15 videos
56 minutes of training

Reversing Rootkits
Course
Reversing Rootkits

Reversing Rootkits

Look more closely at the challenge of reversing rootkits with four videos on rootkit structure and behavior.

4 videos
11 minutes of training

Anti-Disassembly, Anti-Debugging and Anti-VM
Course
Anti-Disassembly, Anti-Debugging and Anti-VM

Anti-Disassembly, Anti-Debugging and Anti-VM

Malware doesn't want to be disassembled, and it's going to fight you. Seven videos examine anti-disassembly, anti-debugging and anti-VM strategies used by malware.

7 videos
31 minutes of training

Packed Malware
Course
Packed Malware

Packed Malware

Sometimes, malware is just hiding. Four videos examine the issue of packed malware, including tools, tricks and popular packers.

4 videos
17 minutes of training

Obfuscation, Encoding and Encryption
Course
Obfuscation, Encoding and Encryption

Obfuscation, Encoding and Encryption

Reintroduce yourself to three ways malware disguises itself: obfuscation, encoding and encryption.

8 videos
41 minutes of training

Reversing C++
Course
Reversing C++

Reversing C++

Our four-video course will reintroduce you to the art of reversing C++.

4 videos
28 minutes of training

Reversing 64-bit Malware
Course
Reversing 64-bit Malware

Reversing 64-bit Malware

Two videos take you through the ins and outs of reversing 64-bit malware, including functions, code samples and tools.

2 videos
14 minutes of training

 

What you’ll learn.

  • Malware types and behaviors
  • Reverse engineering tools, including IDA Pro and Ollydbg
  • Conducting a reverse engineering analysis
  • Binary obfuscation schemes
  • Analyzing hostile malware
  • And more!

Who is this for?

A firm understanding of the Windows OS, knowledge of computer architecture concepts and exposure to the Linux OS or other Unix-based OS is recommended. This skill path is designed for:

  • Malware analysts
  • Security researchers
  • Cybersecurity professionals looking to gain a technical understanding of malware
  • Anyone with a desire to build their skills around malware and reverse engineering!

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer