LEVEL: ALL LEVELS

Free Trial.
Reverse
Engineering 101

‘Reverse Engineering 101’ by Kaspersky opens the door on the field for reverse engineering , a core skill for those wanting to build a career as a malware analyst or threat hunter. The on-demand online format allows companies to upgrade staff without interrupting their work. Starting from the basic concepts, learners gradually move through Intel assembly instructions, distinctive calling conventions and memory types, executable analysis and more to finally reverse ‘real’ malware and solidify their knowledge and skills.
Write your awesome label here.

Denis Legezo
Security Researcher

Denis Legezo is a GCFA certified Security Researcher. He specializes in targeted attack research, static reverse engineering. Denis regularly provides training on these subjects and has presented his targeted malware research at SAS, RSA Conference, Virus Bulletin, HITB.

Write your awesome label here.

Ivan Kwiatkowski
Security Researcher

Ivan Kwiatkowski is an OSCP and OSCE-certified penetration tester and malware analyst. He maintains an open-source dissection tool for Windows executables and his research has been presented during several cybersecurity conferences

Training objectives

Gain the initial knowledge needed for malware analysis.
Understand the main Intel assembly instructions.
Understand different calling conventions (stdcall, fastcall) and memory types (automatic, dynamic, static).
Analyze executables generated by different compilers to become unafraid of more “esoteric” ones.
Learn the tools used by the world's top professionals.
Prepare yourself for the next level RE course.

Help & support

Please contact us at help.kasperskyxtraining.com if you are experiencing technical issues or need help and would like to chat with a Kaspersky expert.

Also, we invite you to join our Discord community for all the Kaspersky Expert Training learners, where you can talk with your peers, discuss courses’ exercises and much more.Click the link below and enjoy https://discord.gg/Ffxvjgn7XD