All Courses

Kaspersky Academy

Targeted Malware Reverse Engineering

  • Length

    100 hours

  • Result


  • For whom

    InfoSec professionals

Skilled reverse engineers aren’t born — they’re made by experience. If you are a cybersecurity specialist with a good understanding of malware analysis methodologies & tools and are looking for more confidence in applying your skills, you can bridge the gap by working hands-on with real-life cases.

For Whom

  • Malware Analyst

    1) Information security professionals: security researchers and incident response personnel or students, malware analysts, security engineers, network security analysts, APT hunters, and IT security officers working in SOCs who are looking to enhance their reverse engineering skills. 2) Businesses planning to upskill their current cybersecurity or SOC team or create a new in-house unit. 3) Specialist consultants who need to train their team in the relevant practical skills.

What you will learn

  • Learn from Ivan Kwiatkowski and Denis Legezo, Senior Security Researchers and members of Kaspersky’s revered Global Research and Analysis Team.
  • Learn how to use tools like IDA Pro through real targeted malware cases like Lazarus, LuckyMouse and MontysThree in our fully configured virtual lab.
  • The course is structured around progressive learning with a consistent module framework based on specialist overviews of each task, practical work in the virtual lab and detailed solution walk-throughs.

Our Experts

Denis Legezo

Denis Legezo

Lead Security Researcher

Denis Legezo is a GCFA certified Senior Security Researcher in the Kaspersky Global Research & Analysis Team (GReAT) since 2014. He specializes in targeted attacks research, static reverse engineering.

Ivan Kwiatkowski

Ivan Kwiatkowski

Senior Security Researcher

Ivan Kwiatkowski is an OSCP and OSCE-certified penetration tester and malware analyst who has been working as a Senior Security Researcher in the Global Research & Analysis Team at Kaspersky since 2018.

Education Programm

  • Analyze real-life malware used in the wild by APT groups. Reverse-engineer malicious documents and exploits.
  • Approach reverse engineering programs written in a number of programming or scripting languages (C, .NET, Delphi, Powershell, JavaScript, C++) and compiled for different architectures (x86, x64) with different compilers or operating systems (Windows, Linux).
  • Master advanced features of reverse-engineering tools including IDA Pro’s scripting capabilities.

You can also get acquainted with a more detailed course program

Course results

  • Certificate

Training Request

The course is held in group format for companies and universities. If you would like us to run a course for your students or employees, please fill out the short form and we will contact you without fail