
Assembly x86/x64
Date: TBD
Available: YES
Description: This training provides the fundamentals of Assembly for both x86 and x64 architectures to help the student in his career in reverse engineering. The course covers programming simple routines in Assembly, important concepts such as Stack and Calling Conventions. Additionally, there is a section showing how to decode opcodes and another covering how to recognize repeating structures and conditionals. Finally, the last section presents several real malware codes and their respective interpretation.
Additional information can be obtained by sending a message to the email address marked on the banner.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/assembly_x86_x64

Network Threat Analysis
Date: TBD
Available: YES
Description: This training explains techniques and methodologies for analyzing network traffic through PCAPs as well as the detection and decoding of C2 (Command and Control Channel) used by malware threats in general. It is a course fully applied and done in practice, always aiming to provide the maximum knowledge to students and provide conditions for them to be able to analyze scenarios similar to and derived from those presented at the beginning of the course.
Additional information can be obtained by sending a message to the email address marked on the banner.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/network_threat_analysis

Incident Response and Threat Hunting 1
date: TBD
Available: YES
Description: This is an intense, practical training, and contains current topics, where we try to cover as many subjects, techniques and implementations as possible for Incident Response and Threat Hunting, thus providing conditions for the professional to have all the information and resources necessary to carry out investigations.
This course provides an extensive coverage of topics from various logging techniques, through detection, analytical correlation, incident response, threat hunting to forensics.
Additional information can be obtained by sending a message to the email address marked on the banner.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/incident_response_1

Incident Response and Threat Hunting 2
Date: TBD
Available: YES
Description: The focus of this training is completely practical, applied and using more elaborate techniques to find latent and hidden threats in the system, which are also used by rootkits and modern threats.
During the course, the student will learn how to detect threats through memory analysis in several scenarios that can be challenging.
This training with difficulty level above the Incident Response and Threat Hunting 1 training.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/incident_response_2

IR: Ransomware Investigation
Date: TBD
Available: YES
Description: This is an intense training, structured in practical aspects, and totally focused on the Incident Response and Threat Hunting process to deal with ransomware attacks. As with other content we offer, the content is technical and based on ransomware and real scenarios.
Students who have taken previous Incident Response 1 and 2 courses can complement their knowledge through this specific training.
Registration information and fees can be obtained by sending a message to the email address marked on the banner.
Further information about the course: https://exploitreversing.com/ir_ransomware

Windows Exploit Development 1
Date: TBD
Available: YES
Description: This training teaches, from the beginning, the necessary concepts and techniques in a detailed way to help the student in the development of exploits for Windows. As it is an initial training, this course focuses on exploring the stack and, additionally, it serves as a prerequisite for the Exploit Development 2 course (to be announced soon).
The training topics cover all matters of stack exploitation from simple buffer overflow to ROP.
Registration information and fees can be obtained by sending a message to the email address marked on the banner
Further information about the course: https://exploitreversing.com/exploit_development_1