Hero Banner

Reverse Engineering & Malware Analysis Training Course

One course that covers everything you need to know about the concepts of malware, their types and their functionality

We have trained over 750 organizations including:

18+ content-rich videos covering all basic concepts of Reverse Engineering & Malware Analysis

Practice malware lab setup consisting of virtual machines & sandbox environment

Get familiar with debuggers, disassemblers & other monitoring tools to perform analysis

Learn to use these tools to track the movement of malware across the virtual network


This course introduces the concepts of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APTs) to siphon off critical business information from an organisation on a regular basis.

Completing this course will give you an upper hand in dealing with the advanced cyber criminal, thereby enhancing your employability tremendously in the fast-growing and lucrative field of cybersecurity.

Benefits of the Reverse Engineering & Malware Analysis Training Course

  • Offers detailed coverage of the basic concepts of Reverse Engineering and Malware Analysis through high-quality, content-rich videos.

  • Delves deep into advanced techniques such as analysing shellcodes, powershell malwares, malicious documents and anti-virus evasion.

  • Opens your eyes to the different anti-reversing, anti-emulation and anti-debugging techniques used by advanced malwares.

REMA (1)


Reverse Engineering & Malware Analysis Course Learning Objectives:

After the completion of this course, you will be able to: 

  • Understand and articulate the Taxonomy of malwares, their types and infection concepts.

  • Gather a fair degree of expertise in Advanced Persistent Threats Versus Malware.

  • Properly understand Assembly Language, the Concept of PE and PE Header.

  • Enhance your knowledge of Debuggers and Disassemblers.

  • Understand and explain Static and Dynamic Malware Analysis.

  • Work on analysing malicious documents, Shellcode detection & analysis and extraction & analysing methodologies.

  • Comprehend Anti-Emulation and Debugging Techniques & Packers and Cryptors.

Feedback and Testimonials for our Courses

Kevin Hayes
The playbooks training course was a good 'part-2' to the CIPR and went into greater depth in a number of areas. The day was fun and Amar kept us moving along at a good pace.
Kevin Hayes
CISO, Cyber Risk Associates
Russ Smith

Enjoyed the course. Good mix of attendees and plenty of lively conversation. Amar steered us through it all admirably.

Russ Smith
Kim Rose

Overall the course was very good. I would strongly recommend this training to anyone who is involved in Cyber Security or has control of information assets.

Kim Rose
Information Governance Officer, Wye Valley NHS Trust
Philipp Scheiwiler

It was a great workshop with a lot of interesting people and a great learning experience.

Philipp Scheiwiler
System Engineer
Andrew Lock
This was a very helpful day and opportunity to speak with a number of operational incident responders to discuss what really works in practice and not just in theory. I gained a great deal from the day, particularly around the construction of bespoke playbooks and also a variety of useful resources to inform my learning. A really good day.
Andrew Lock
Information Security Consultant

Reverse Engineering & Malware Analysis Course Modules 

Module 1 - Introduction
  • Introduction.

  • Introduction to Assembly Language. 
Module 2 - Reverse Engineering
  • Reverse Engineering - Overview of PE Header. Practical Analysis of PE Header. 

  • Disassembly and Debugging.
Module 3 - Malware Analysis
  • Types of Malware Analysis.

  • Memory Forensics. 

  • Shellcode Analysis. 

  • Analyzing Malicious Documents. 

  • AV Evasion. 

  • Packers and Cryptors.

  • Anti-Emulation & Anti-Debugging Techniques.

All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.

Building and Optimising Incident Response Playbooks

Find out more about our one day public courses or internal workshops, please complete the form below. 

  • callOr call us on:
  • +44 (0) 203 189 1422