Kaspersky Academy
Targeted Malware Reverse Engineering
Length
Access 6 months
Result
PDF document of completion signed by the course leader(s)
For whom
InfoSec professionals, Enterprises, Cybersecurity consultancies
Skilled reverse engineers aren’t born — they’re made by experience. If you are a cybersecurity specialist with a good understanding of malware analysis methodologies & tools and are looking for more confidence in applying your skills, you can bridge the gap by working hands-on with real-life cases.
For Whom
Malware Analyst
- Information security professionals: security researchers and incident response personnel or students, malware analysts, security engineers, network security analysts, APT hunters, and IT security officers working in SOCs who are looking to enhance their reverse engineering skills.
- Businesses planning to upskill their current cybersecurity or SOC team or create a new in-house unit.
- Specialist consultants who need to train their team in the relevant practical skills.
InfoSec professionals
Security researchers, incident response personnel or students, malware analysts, security engineers, network security analysts, APT hunters and IT security staff working in SOCs who are seeking to expand their skills in reverse-engineering.
Enterprises
For teams and enterprises focusing on threat hunting.
Cybersecurity consultancies
Specialist consultancies who need to train their team on relevant practical skills to be able to offer malware analysis services to their clients will also benefit from this course.
Our Experts
Education Programm
-
Analyze real-life malware used in the wild by APT groups.
-
Reverse-engineer malicious documents and exploits.
-
Approach reverse engineering programs written in a number of programming or scripting languages (C, .NET, Delphi, Powershell, JavaScript, C++) and compiled for different architectures (x86, x64) with different compilers or operating systems (Windows, Linux).
-
Master advanced features of reverse-engineering tools including IDA Pro’s scripting capabilities.
-
Understand steganography in greater detail.
-
Handle obfuscated or encrypted content in malicious software.
-
Become more familiar with assembly.
-
Understand the roundabout ways attackers launch their programs.
-
Analyze shellcodes.
You can also get acquainted with a more detailed course program