• $350 or 2 monthly payments of $175

Malware Analyst Professional - Level 1

  • Course
  • 56 Lessons
  • Community access

In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.

Exclusive for TrainSec students, 20% discount:

Ever wanted to work with Threat.Zone? The time is now!

20% off for Malware analyst professional students.

With features like MemProcFS for analyzing memory dumps, CDR for sanitizing files, and CSI tools for digital forensics, Threat.Zone provides a powerful environment for malware analysis and security investigations.

Level Up Your Skills with Our Malware Analysis Course!

This course lays the groundwork for mastering malware analysis. Gain essential skills, earn certification, and launch your cybersecurity career with confidence!

Hands-On Experience

Gain practical experience through hands-on labs and real-world case studies, allowing you to apply theoretical knowledge to practical scenarios. Develop the confidence and proficiency to analyze and combat various types of malware effectively.

In-Demand Skills

Acquire the specialized skills and knowledge needed to excel in the dynamic field of cybersecurity. Our comprehensive curriculum covers the latest malware analysis techniques, ensuring you stay ahead of the curve in this rapidly evolving industry.

Lifetime Access to Resources

Enjoy lifetime access to course materials, updates, and resources, ensuring you stay current with the latest trends and developments in malware analysis. Continue to refine your skills and knowledge long after completing the course.

Certificate of Completion

Upon successful completion of the course, you'll receive a prestigious certification that is widely recognized and respected by employers worldwide. Stand out from the crowd and showcase your expertise as a certified malware analyst professional.

Career Advancement Opportunities

Open doors to exciting career opportunities in cybersecurity with our malware analyst professional certification. Whether you're looking to advance in your current role or transition to a new career path, our training program equips you with the skills and credentials needed to succeed.

Exclusive Online Community

Connect with industry professionals and fellow students through our exclusive online community. Share insights, collaborate on projects, and expand your professional network to enhance your career prospects.

Personalized Support

Receive personalized support from our team of experienced instructors who are dedicated to your success. Get answers to your questions, guidance on challenging concepts, and tailored feedback to help you excel in your studies.

About the Instructor

Security researcher, consultant, and the author of the Antivirus Bypass Techniques book who lives both on the offensive and defensive fronts. Passionate about malware research, and red teaming while providing real-world security solutions. Contributing through creating content on YouTube, writing blogs, leading various courses, and mentoring people on the offensive and defensive fronts.

Only course students get

30% off Antivirus Bypass Techniques book

Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Enroll in this course and receive a 30% discount on the best-seller Antivirus Bypass Techniques book.

Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.

Students Testimonials

Or Levy

Mobile Security Research Team Leader at Appdome

“I want to recommend Uriel Kosayev as a quality professional security researcher and lecturer who knows how to guide his students, give the right word, and push them to success. I had the pleasure of being his student.”

Max Malyutin

Threat Researcher and Orion Malware Research Team Leader at Cynet

“The one and only master, thank you! Your knowledge and your passion for Cyber make you a great teacher!!!”

Matan Haim Guez

Security Researcher at Palo Alto Networks

“Uriel is a great lecturer and person not only because of his knowledge in security research, offensive security, and Malware Analysis but also because of the passion that he provided me as a student to keep asking questions and research by myself. Uriel empowers his students with the theory behind the scenes, practical tools to handle complex problems, and the ability to empower the people who learned and work with us.”

Omer Dahan

Mobile Security Researcher at Appdome

“I want to say that Uriel Kosayev is one of the best researchers in the industry, with a lot of experience in the field of investigations and reverse engineering, I learned a lot from him. In addition, he has one of the best books on the market that teaches anti-virus bypass methods. I recommend everyone to acquire knowledge from Uriel!”

Sahar Shlichove

Senior SOC Analyst at TrustNet

“Uriel is one of the best Cybersecurity trainers among all the people I have ever met. A rare combination of professionalism and high-quality delivery excellent and creative ways he delivers the material. On top of that, if you will ever be a student in his class, I can guarantee you that he will explain to you till you finally understand the learned material. A great lecturer and mentor!”

Maria Korlotian

Development Team Leader at Mend

“I highly recommend Uriel as a Cybersecurity Specialist. I had the privilege of participating in his training session – it was an exceptional experience! Uriel delivered practical insights that significantly enhanced my and my Team's knowledge and skills in the field. The training was well-structured, engaging, and tailored to the latest industry trends. I am grateful for the opportunity to learn from Uriel and would eagerly participate in any future training sessions organized by him.”

Yehuda Smirnov

Red Team Security Researcher @ Accenture | Penetration Tester

“I took the Certified Malware Analyst Professional. Uriel is a great instructor, goes into the fine details of subjects, and answers questions with attention. I recommend the course for anyone looking to get into malware reverse engineering and perform malware analysis of samples. The skills obtained have helped with studying different Windows mechanisms as well as developing custom malware.”

Adam Joron

Senior IT Specialist, Security+ certified.

“Uriel is the best cyber instructor I have ever met.
he has a very interesting way of communicating and teaching his knowledge.
Besides his Antivirus Bypass Techniques book that was written by him is a POWERFUL book with tons of knowledge that helped to set me ahead in my career.
it has been a pleasure being your student Uriel.”

This course is intended to take you from zero knowledge in malware analysis and reverse engineering to a professional level!

Basic requirements for the course

Basic understanding of networking: TCP/IP, Routing, Forwarding

Reading and understanding code

Basic understanding of Windows Server and Linux Shell commands

Basic understanding of well-known protocols such as HTTP/HTTPS, DNS, SMTP, FTP, SSH

PC/MAC with Intel i5/i7/i9 CPU, 16GB of RAM and an SSD storage

VMware Workstation/Fusion installed

Contents

Course Syllabus

Malware Analyst Professional - Level 1 Syllabus.pdf
  • 365 KB
Preview

Malware Lab Samples

Here you can download all the relevant samples so you can reproduce the analysis steps with me together.

404 Not Found - Isn't that a Mystery?!
    space1 - FlawedAmmyy.zip
    • 108 KB
    Malicious Documents Lab Samples.zip
    • 839 KB

    YARA Rules

    sodinokibi.yara
    • 768 Bytes
    PE.yara
    • 169 Bytes
    WannaCry.yara
    • 1.61 KB
    UPX.yara
    • 669 Bytes
    Cryak.yara
    • 1.58 KB
    Preview

    Introduction and Lab Setup

    Malware Analysis Lab OVA Deployment
      1 - Introduction to Malware Analysis.mp4
      • 11 mins
      • 39.7 MB
      Preview
      2 - Lab Setup - Intro.mp4
      • 3 mins
      • 10.6 MB
      3 - Lab Setup - Deploying Flare-VM.mp4
      • 5 mins
      • 39.4 MB
      4 - Lab Setup - Connecting to INetSim.mp4
      • 13 mins
      • 53.5 MB

      Introduction to Code Reverse Engineering

      1 - Installing Visual Studio.mp4
      • 4 mins
      • 23.4 MB
      2 - The four stages of Development.mp4
      • 5 mins
      • 14.9 MB
      3 - Basic C Code Example - Part 1.mp4
      • 7 mins
      • 24.6 MB
      4 - Basic C Code Example - Part 2.mp4
      • 11 mins
      • 66.5 MB
      example1.c
      • 720 Bytes
      example2.c
      • 2.39 KB
      5 - Basic Reverse Engineering - Part 1.mp4
      • 25 mins
      • 138 MB
      6 - Basic Reverse Engineering - Part 2.mp4
      • 5 mins
      • 30.2 MB

      The PE Structure

      1 - PE Structure Overview - Part 1.mp4
      • 13 mins
      • 145 MB
      2 - PE Structure Overview - Part 2.mp4
      • 14 mins
      • 81.9 MB
      3 - PE-exe vs. PE-dll.mp4
      • 8 mins
      • 46 MB

      Static Malware Analysis

      1 - Purpose and Goals of Malware Analysis.mp4
      • 5 mins
      • 16 MB
      2 - Understanding Signature Names and VirusTotal Overview.mp4
      • 12 mins
      • 67.8 MB
      3 - IoC vs. IoA.mp4
      • 8 mins
      • 58.3 MB
      4 - Identifying File Types.mp4
      • 5 mins
      • 31.1 MB
      5 - Calculating Hashes.mp4
      • 11 mins
      • 65.5 MB
      6 - Strings Extraction.mp4
      • 6 mins
      • 35.4 MB
      7 - Packing Analysis - Part 1.mp4
      • 9 mins
      • 53.3 MB
      8 - Packing Analysis - Part 2.mp4
      • 15 mins
      • 90.4 MB
      Preview
      9 - Packing Analysis - Part 3.mp4
      • 4 mins
      • 15.1 MB
      10 - Identifying Malicious Functionality.mp4
      • 10 mins
      • 55 MB
      11 - Approaching and Reading Documentations.mp4
      • 10 mins
      • 60.8 MB
      12 - Dissecting FlawedAmmyy - Part 1.mp4
      • 26 mins
      • 211 MB
      13 - Dissecting FlawedAmmyy - Part 2.mp4
      • 26 mins
      • 160 MB
      14 - Saving your RE progress to an IDB File.mp4
      • 2 mins
      • 9.72 MB

      Dynamic Malware Analysis

      1 - Introduction to Dynamic Analysis.mp4
      • 29 mins
      • 129 MB
      2 - Working with Process Explorer.mp4
      • 10 mins
      • 58.2 MB
      3 - Extracting IoCs using Process Hacker.mp4
      • 6 mins
      • 39.3 MB
      4 - Working with Procmon.mp4
      • 11 mins
      • 68.7 MB
      5 - Monitoring WinAPI Functions using API Logger.mp4
      • 3 mins
      • 10.4 MB
      6 - Inspecting Process Command Line Parameters using CMD Watcher.mp4
      • 7 mins
      • 37 MB
      7 - Debugging DLL Files with IDA Disassembler.mp4
      • 5 mins
      • 13.4 MB
      Preview
      8 - FlawedAmmyy RAT - Attack Flow PCAP Analysis Overview.mp4
      • 16 mins
      • 90.7 MB
      9 - FlawedAmmyy RAT Dynamic Analysis .mp4
      • 23 mins
      • 185 MB
      10 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 1.mp4
      • 28 mins
      • 208 MB
      11 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 2.mp4
      • 27 mins
      • 212 MB
      12 - Detecting FlawedAmmyy RAT with YARA.mp4
      • 25 mins
      • 120 MB

      Malicious Documents Analysis

      1 - Introduction to Malicious Documents.mp4
      • 8 mins
      • 24.6 MB
      2 - Introduction to Analyzing Malicious PDF Files.mp4
      • 3 mins
      • 9.31 MB
      3 - Analyzing the CVE-2008-2992 PDF Exploit.mp4
      • 6 mins
      • 31.2 MB
      4 - Analyzing VBA Macros - Introduction.mp4
      • 6 mins
      • 19.2 MB
      5 - Analyzing VBA Macros - Shellcode Injection.mp4
      • 15 mins
      • 101 MB

      • $350 or 2 monthly payments of $175

      Malware Analyst Professional - Level 1

      • Course
      • 56 Lessons
      • Community access

      In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming your way.

      From Foundations to Advanced Expertise in Malware Analysis and Reverse Engineering

      Master the Art of Malware Analysis with a Comprehensive Two-Part Course

      The Malware Analyst Professional course is a complete training program divided into two parts: Level 1 and Level 2, designed to take you from beginner to advanced expertise in malware analysis and reverse engineering.

      Starting with Level 1 is crucial, as it provides the foundational knowledge, tools, and techniques. Level 2 builds on this base, diving into advanced topics such as code injection, unpacking packed malware, analyzing shellcode, and overcoming self-defending malware.

      • $350 or 2 monthly payments of $175

      Malware Analyst Professional - Level 2

      • Course
      • 58 Lessons
      • Community access

      The Malware Analyst Professional course is a complete training program divided into two parts: Level 1 and Level 2, designed to take you from beginner to advanced expertise in malware analysis and reverse engineering. Starting with Level 1 is crucial, as it provides the foundational knowledge, tools, and techniques to analyze simple malware effectively. Level 2 builds on this base, diving into advanced topics such as code injection, unpacking packed malware, analyzing shellcode, and overcoming self-defending malware. Together, these parts offer a seamless and comprehensive learning experience, preparing you to confidently tackle real-world malware threats.