Reverse Engineering and Malware Analysis Course Overview

You'll make sense of how to perform dynamic and static examination on each and every critical record types, how to cut vindictive executables from files and how to see essential malware techniques. You'll similarly get some answers concerning gadgets and strategies for "run time" examination, investigating and disassembling harmful copies and framework traffic assessment.


  • Who have managed occurrences including malware and needed to figure out how to comprehend key parts of pernicious projects.
  • A technologists who have tried different things with parts of malware investigation preceding the course and who wish to formalize and extend their ability around there.
  • Legal agents and professionals of security willing to spread their area of abilities and figure out how to assume a vital job in the episode reaction process.

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

  • 1. Do you have limited Window for training?
  • 2. Can you only spend 4-hours per day?
  • 3. Do you want to start training immediately?
  • If your answer is yes to any one of the above, you need 1-on-1- Training
The 1-on-1 Advantage
Flexible Dates
4-Hour Sessions
  • View video
  • The course will be free if we are not able to start within 7 days of booking.
  • Only applicable for courses on which this logo appears.

Your will learn:

Module 1: Introduction
  • Introduction to reverse engineering
  • Applications of reverse engineering
  • Introduction
  • Compilers
  • Registers
  • Data Structures
  • Binary Executables
  • IA - 32 Processor Architecture
  • Windows Architecture
  • Offline and Live Code Analysis
  • Disassemblers
  • Debuggers
  • Decompilers
  • Classification Tools
  • Summary Tools
  • System Monitoring Tools
  • Introduction to IDA
  • Launching and Loading IDA
  • IDA database files
  • IDA tips and tricks
  • IDA Data Displays
  • Vulnerability Analysis
  • Password Recovery
  • IDA Scripting
Live Online Training (Duration : 40 Hours) Fee On Request
Group Training Date On Request
1-on-1 Training
4 Hours
8 Hours
Week Days

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Classroom Training is available. Enquire for the fee Click
Ultra-Fast Track

If you can't spare 40 hours. We can offer you an Ultra-Fast Track for 20 hours

Course Prerequisites

·         Have a PC framework that coordinates the expressed PC necessities; some product should be introduced before understudies come to class.

·         Be acquainted with utilizing Windows and Linux working situations and have the option to investigate general OS availability and arrangement issues.

·         Be acquainted with VMware and have the option to import and arrange virtual machines.

·         Have a general thought regarding center programming ideas, for example, factors, circles, and capacities so as to rapidly get a handle on the applicable ideas here; in any case, no programming experience              is  vital.

After completion of this course; you will be able to:

·         Assess the severity and repercussions of a situation that involves malicious software so recovery steps can be planned.


A knowledge on how to establish Indicators of Compromise and obtain other threat intelligence details for analyzing, scoping, and containing the incident.

Request More Information

Add Name and Email Address of participant (If different from you)


Yes, fee excludes local taxes.
The Fee includes:
  • Courseware
  • Remote Labs
Yes, Koenig Solutions is a Learning Partner