Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years. Through a company program, she has elected to complete cybersecurity training and is transitioning to a Reverse Engineering role.

From Software Developer to Malware Reverse Engineer

Olivia was identified in a company-wide challenge organized by the SOC manager to find those with both a technical background and a puzzle-solving mentality that could be applied in security investigations. She is experienced in both procedural and object-oriented programming with languages such as C, C++, Java, and Python. She has been set an initial 12-month goal to become a malware reverse engineer, and then a further goal to specialize in kernel-level analysis of either Windows or Linux systems.

Suggested Learning Track

The following is the suggested learning program for professionals looking to transition into a Malware Reverse Engineering role.

Intro to Cybersecurity

Intro to Cybersecurity is the foundational cyber training for management, IT, end-users, and programmers. This course presents an overview of the current threat landscape and a vision of the future of cybersecurity.

Learn More
01 3-Day Course
02 For IT Professionals
03 CPE/CEU Credit

Behavioral Malware Analysis

Using system monitoring tools and analytic software, students will analyze real-world malware samples in a training environment, building secure labs, classifying malware, analyzing behavior, and documenting findings.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Assembly for Reverse Engineers

Designed for malware analysts and code developers alike, this course will equip you to effectively read assembly, review statements, and reverse machine code back to its higher-level equivalent. 

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 CPE/CEU Credit

Malware Reverse Engineering

Malware Reverse Engineering builds on the knowledge and skills of our Assembly for Reverse Engineers course and teaches students how to perform more advanced analysis of real-world malware samples. 

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 CPE/CEU Credit

Linux Kernel Internals

From kernel module implementation to memory and process management, Linux Kernel Internals teaches you the fundamentals of developing for the Linux kernel.

Learn More
01 5-Day Course
02 15+ Lab Exercises
03 CPE/CEU Credit

Windows Rootkit Reverse Engineering

Students will learn about the Windows kernel, automated and manual unpacking, live kernel debugging with IDA and WinDbg, and reverse engineering drivers. 

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 CPE/CEU Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.
Have a question?

Contact Us

Focal Point is excited to help you advance your cybersecurity team. If you'd like to speak to a Focal Point expert or inquire about our services, please fill out the following form.

Featured Learning Tracks

See where cyber workforce development can take your team.
SOC Analyst I
Learning Track

SOC Analyst 1

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Learn More
Cyber Skills Development 4
Learning Track

Malware Triage Analyst

Alex is an incident responder. After a year in this role, she is looking to further specialize her skillset. Her manager is giving Alex the opportunity to move into a malware triage role.
Learn More
Cyber Threat Hunter
Learning Track

Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam will be participating in a development program to build threat-hunting capabilities.
Learn More