
Malicious Document Analysis 1
Date: TBD
Available: YES
Description: This training provides a 100% hands-on approach to analyzing malicious artifacts such as .doc, .docx, .xls, .xlsx, .rtf, .eml, .msi, .ppt, .pptx, and other well-known formats used as a vector of malware infection today.
Training is guided by exercises, which are explained and solved in real time, and when the instructor explains, if necessary, new concepts that can be used in similar cases.
The training is fully based and carried out using real examples.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/malicious_documents

Malware Analysis 1
Date: TBD
Available: YES
Description: This training has a totally practical focus, and provides all concepts necessary for the student to understand techniques that will be applied during threat analysis.
This course is indicated and suitable for professionals who are entering the field of reverse engineering, and who would like to build fundamental knowledge to work with malware analysis.
All sections are explained only using real examples.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/malware_analysis_1

Malware Analysis 2
date: TBD
Available: YES
Description: This training teaches main concepts and techniques currently used to analyze modern binary artifacts. The course covers main topics and tasks of reverse engineering in malware analysis, and teaches, in a practical way, how to proceed in each step. This training is totally hands-on, and based only on real binaries.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/malware_analysis_2

Malware Analysis 3
Date: TBD
Available: NOT YET
Description: This training is the last in the Malware Analysis series and, therefore, it is the most complex of all. Initially a quick review of binary analysis is offered with techniques learned in the previous course, but quickly the training progresses to more sophisticated subjects such as scripting in IDC/IDA Python, development of IDA Pro plugins, analysis of .NET malware and malware in different languages . In the second part of the course there is a section on ransomware analysis and an introduction to reverse engineering code in C++. Next, a section on emulation, binary analysis and symbolic execution is presented. Finally, the course ends with two sections that provide the necessary concepts and techniques for analyzing kernel drivers and mini-filter drivers.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/malware_analysis_3

C Windows System Programming 1
Date: TBD
Available: YES
Description: This training provides to students a hands-on approach about how to create programs that interact with Windows.
In this course, which is aimed at cyber security professionals, we review fundamental constructs like pointers and structures, then explain key areas like memory management, I/O, Processes, Threads, various synchronization techniques, thread pools, and finally, techniques asynchronous I/O operations.
It is interesting to remember that this course is the first part of the C Windows System Programming training, which is composed of three trainings.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/c_programming_1

C Windows System Programming 2
Date: TBD
Available: YES
Description: This training provides to students a hands-on approach to how to create programs that interact with Windows. In this course, which is focused on cyber security professionals, we explain how to develop programs on essential topics such as Mapped Files, DLLs, interactions such as the Registry, creating services, IPC, code injection, hooking, network communication, security and exceptions.
It is interesting to remember that this course is the second part of the C Windows System Programming training, which is composed of three trainings.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/c_programming_2