Skip to main content

Malware Reverse Engineering

Malware Reverse Engineering builds on the knowledge and skills from earlier courses in the track and teaches students how to perform more advanced analysis of real-world malware samples. The primary techniques taught are disassembly and debugging. The course also covers topics such as data decoding and binary obfuscation in order to bypass protections and perform effective analysis on hardened samples, how to deal with destructive malware, and how to defeat anti-debugging and other anti-analysis techniques.

Request Course Details

Attending students will learn

  • Converting Source Code to Assembly
  • Intel CPU Memory Management and Structures
  • CPU Control Flows
  • IDAPro, OllyDBG, and other Common Tools
  • Stepping, Stepping Over and Running Code using a Debugger
  • Breakpoint Fundamentals and Usage
  • Patching and Assembling Executables
  • Decrypting and Unpacking Protected Programs

Who should attend

  • Malware Analysts
  • Software Engineers
  • Forensic Investigators
  • Tier 3 Incident Responders


This is an intense debugging and disassembly course. Significant experience with assembly language is required to fully benefit from this course. C Programming and Assembly for Reverse Engineers are recommended prerequisites for those lacking programming and assembly experience.

Request More Info About This Course


tweets by @FocalPointDR

Loading Tweets...