STAY CONNECTED
COMMITTED TO EXCELLENCE

Connect with us for regular cyber security updates and blog posts!

  • LinkedIn - Grey Circle
  • Facebook - Grey Circle
  • Twitter - Grey Circle

This institution is regulated by the Office for Career and Technical Schools

10 N Senate Avenue, Suite SE 308, Indianapolis 46204

OCTS@dwd.in.gov http://www.in.gov/dwd/2731.htm

AuthPartner-4c.png
LOCATIONS

​Training Location

101 West Ohio Street

Suite 2000

Indianapolis, In 46204

Business Mailing Address
3815 River Crossing Pkwy

Suite 100

Indianapolis, IN 46240

EMAIL info@SecOpscyberinstitute.com   |   PHONE  (877) SecOpsCI  (877) 732-6772

Copyright SecOps Cyber Institute™ 2019

Expert
Class Date:
Price:
Course Days:
Coming Soon
$2,999
5

Malware Reverse Engineering

Track Type:
Track:
Prerequisite:
Cyber Security Track
Malware Expert
Security Analyst Track
 

Malware Reverse Engineering

The Malware Reverse Engineering Certification is a structured lab-based exam for Malware Professionals looking to expand their level of Malware Analysis knowledge with reverse-engineering malware techniques in controlled environments.  The lab-based program will test the skills necessary for encountering, analyzing and reverse-engineering malicious code to determine the code’s intent and capabilities.

 

The program will provide the Malware Professional the ability to advance their Malware Analyst Skills with an advanced hands-on lab based structure.  This will give the student the highly sought after skills of being a Malware Reverse Engineer.  It will provide the student with the formatting, methodologies and tools necessary for reverse engineering malware techniques that simulate real-world scenarios all within a structured lab format. 

 

Due to the expert-level structured lab format OpSec Cyber Security Institute’s provides, we will not be handing out ahead of time the entire LAB Curriculum.  A portion of the Malware Reverse Engineering Lab format will contain:
 

  • Create Toolkit for Reverse Engineering

  • Dynamic and Static Analysis for determination of the code’s behavior

  • Malware Code execution analysis

  • Reverse Engineering malicious files, content and programs

  • Examining Shellcode

  • Analyzing Memory for forensics and characteristics

Class Date:
Coming Soon

* Prerequisite of workplace experience analysis send to
   Email: info@SecOpsCyberInstitute.com