Theory
- Introduction to ASM
- The Most Common ASM Instructions
- Correspondence Between C Code And ASM
- Solution: Reading ASM Code. Function calls
- Calling Conventions
- Solution: Understanding a full function. Wrap-up
X
X
X
X
Learn navigation inside the assembly code, the difference between values and pointers, concepts of stack and heap, custom data types and shifted pointers! Get introduced to Golang and Rust reverse engineering – and finally, reverse ‘real’ malware to solidify your knowledge and skills!
Get introduced to reverse engineering by Kaspersky’s top experts from the Global Research & Analysis Team (GReAT), a group of the chosen few providing company leadership in anti-malware research.
All levels
$890 inc. tax per learner
All levels
$890 inc. tax per learner
For computer science specialists, it is not always obvious where to apply their skills when building a stunning future career. Cybersecurity is one of the most in-demand types of expertise on the market. Businesses need it to protect themselves from malware attacks – according to a Kaspersky report, about one-in-three ransomware Trojan victims are corporate users.
‘Reverse Engineering 101’ by Kaspersky opens the door on the field for reverse engineering, a core skill for those wanting to build a career as a malware analyst or threat hunter.
The on-demand online format allows companies to upgrade staff without interrupting their work. Starting from the basic concepts, learners gradually move through Intel assembly instructions, distinctive calling conventions and memory types, executable analysis and more to finally reverse ‘real’ malware and solidify their knowledge and skills.
This course is a prequel to the next-level ‘Targeted Malware Reverse Engineering’ training also available on-demand.
Start your malware reverse engineering journey with Kaspersky!
Security Researcher
Denis Legezo is a GCFA certified cybersecurity professional who specializes in targeted attacks research, static reverse engineering.
Denis regularly provides training on these subjects and has presented his targeted malware research at SAS, RSA Conference, VirusBulletin, HITB.
Security Researcher
Ivan Kwiatkowski is an OSCP and OSCE-certified penetration tester and malware analyst who has been working as a Senior Security Researcher in the Global Research & Analysis Team at Kaspersky since 2018.
He maintains an open-source dissection tool for Windows executables and his research has been presented during a number of global cybersecurity conferences. He operates an exit node of the Tor network and also delivers Kaspersky’s reverse-engineering training in Europe.
Enterprises
If you are looking to beef up your SOC or cybersecurity team with a reverse engineer or malware analyst, this course will allow your IT staff to make a first step into reverse engineering malware.
Cybersecurity consultancies
The course benefits specialist consultancies who need to train their team in relevant practical skills to be able to offer malware analysis services to their clients.
Would-be InfoSec professionals
The course is designed to upskill individual learners looking to embark on a career in cybersec. While learning, you will develop reverse engineering potential and prepare yourself for more advanced steps.
Guided video lectures
Practice in our dedicated GitHub repository, designed specially for the course.
Code snippets on GitHub
Practice in our dedicated GitHub repository, designed specially for the course.
Iterative learning
The course is structured around progressive learning with a consistent module framework based on specialist overviews of each task, practical work in GitHub and detailed solutions.
Six months to complete your course from activation of your access code
Courses delivered in English with subtitles
Self-guided learning that fits around your life
Browser-based access to virtual lab
PDF downloads of training materials and tips
Browser-based via desktop, mobile & tablet (excludes virtual lab which requires an RDP client)
Members of Kaspersky Global Research and Analysis Team (GReAT)
50+ videos to guide you through the course
Dedicated GitHub repository for hands-on learning
PDF document on a Kaspersky letterhead certifying the completion of the course, signed by the course leader(s)
Reverse engineering
This course is your gateway to unlocking the full potential of a powerful reverse engineering tool Ghidra for advanced malware analysis.
Reverse engineering
Strengthen your skills in advanced static techniques, get to know decrypting frameworks to automate your tasks to make your reversing skills unique!
Reverse engineering
The course features static and dynamic analysis of some outstanding and unique mobile malware including Android and iOS samples.
Each and every month we share our latest news, tips, tricks and advice on all things cybersecurity related.
Be the first to find out when we run competitions, promotions, launch new courses, release free webinars and much more!