Malware Analyst Path
Become an expert in malware analysis:
From Malware Analyst to Reverse Engineer
Begin your journey to discover malware and learn how to study and analyze it with our certified courses, designed to guide you toward excellence.
- University
professors - 24/7 access to the course
- Tests and assessment exercises
- Downloadable material
- Final examination and certification
A Flexible and Comprehensive Training Program
Start with the basics and achieve excellence with our modular and flexible approach, designed to adapt to your needs and pace.
Malware Analyst Path
-

Dynamic Course
Malware Analyst -

Professional Course
Reverse Engineer
Our Malware Analyst Path is designed to offer a tailored learning experience. Thanks to the modular structure of our courses, you can start with the Dynamic Malware Analyst Course to build a solid foundation, and continue with the Professional Reverse Engineer Course to acquire advanced skills.
Why participate in our malware analysis courses?
From Zero to Expert quickly and easily
Start with the Dynamic Malware Analyst course to learn how to analyze malware dynamically, and progress to the Reverse Engineer course, where you will learn the secrets of Assembly and discover how to identify malware behavior.
Realistic Simulation Laboratories
You will have access to sophisticated simulation labs designed to replicate complex cybersecurity scenarios. This controlled environment is ideal for experimenting and honing your skills without the risks of the real world.
Acquiring the skills to identify abnormal software behavior
You will receive constant support from the teacher
Unlimited Access to Content and Resources
You will obtain prestigious certifications
The P.A.C.E.S. Learning Ecosystem
"You don't just pass an exam — you master the profession"
The P.A.C.E.S. Method
A structured learning methodology that guides you from foundational knowledge to real-world mastery, step by step.
HackMeUP Labs
Prove your skills in 111+ realistic simulation labs designed to replicate complex, real-world cybersecurity scenarios.
Uppy AI Coach
Your personal coach available 24/7 to explain concepts, clarify doubts, and keep you on track and confident.
The Teachers

Antonio Capobianco, CEO of Fata Informatica, parent company of the CybersecurityUP brand and leader for over 30 years in the field of IT security.
He has an extensive background in academia, spanning Italy’s most elite institutions and currently lectures in Ethical Hacking and Malware Analysis at e-Campus University.
He is the author of the podcast ‘Cybersecurity & Cybercrime’.
The Company

We are the only Italian company to have been included by Gartner in its ‘Marketing Guide for IT monitoring tools’ thanks to our Sentinet3 product, developed in 2004 and now recognised as the leader in the Italian market.
We have created a business unit specialising in cybersecurity services, called CybersecurityUP, with the aim of providing vertical cybersecurity services to our customers, primarily the defence sector and companies of national strategic interest.
Course details
Dynamic Malware
Analyst Course (CDMA)
Course objectives
This course aims to train Malware Analysts capable of performing both static and dynamic analysis without the need to know assembler or use disassemblers or debuggers. During the course, participants will learn about the types of malware, the architecture of Windows systems and processes, the main primitives used for specific malware actions, and the probes to use to identify their behavior.
Introduction to Cybersecurity
- Cybersecurity
- Introduction
- The kill chain
- Analysis of an attack
- Introduction to Malware
- The PE Format
- DLLs
- Kernel Vs User Mode
- APIs
- Malware Characteristics
- Signatures
- Obfuscation and Mutation
- Polymorphic Malware
- Metamorphic Malware
- Mutation Engines
- Persistence
- DLL Hijacking
- Trojanized System Binaries
- Types of Malware
- Viruses
- Backdoors
- Adware
- Spyware
- Keyloggers
- Trojans
- RATs
- Cryptojacking
- Rootkits
- Ransomware & Co
- The Malware Market
Windows OS
-
The Windows System
- Processes
- Virtual Address Space
- Threads
- Process Loading Stages
- Context Switching
- WOW64
- Main Windows Processes
- System Idle Process
- Registry
- Interrupts
- smss.exe
- Memory Compression
- svchost.exe
- csrss.exe
- wininit.exe
- winlogon
- lsass.exe
- services
- explorer
-
Windows Primitives
- Process Manipulation
- File Manipulation
- Registry Manipulation
- Sockets
- DLL Loading
PE format
- RVA, VA and ImageBase
- The Headers
- DOS Header
- NT Header
- Optional Header
- Section Header
- The Sections
- .text
- .rdata
- .data
- .edata
- .rsrc
Static and Dynamic Analysis
- Static Analysis
- Antivirus Scanners
- Hashing
- Strings
- Packed Malware
- DLLs and Functions
- Dynamic Analysis
- Sandboxes
- Malware Execution
- Process Monitoring
- Registry Monitoring
- Network Simulation
- Packet Sniffing
Malware Behaviour
- Persistence Techniques
- Registry Keys
- File System
- Processes
- Services
- Injection Techniques
- DLL/Code Injection
- Image File Execution Options
- DLL Search Order Hijacking
- Process Injection
- Process Hollowing
- APC Injection
- Extra Window Memory Injection
- Hooking Techniques
- API Hooking
- IAT Hooking
Final certification

Professional Reverse Engineer Course (CPRE)
Course objectives
Reverse engineering allows you to analyze and understand the inner workings of software. In the field of cybersecurity, it is crucial for studying malicious code and developing effective defenses. Large organizations concerned about the security of their data form specialized teams or hire experts to examine threats. This course teaches how to use reverse engineering techniques and tools to understand the behavior of code, through both static and dynamic analysis. Hands-on labs will help participants become proficient and autonomous in performing these analyses.
Module 1: Assembly language
- Assembly code
- Instructions
- Functions and Stack
- Architecture X64
Module 2: Recognizing structures and loops in Assembly
- Loops and instructions
- Array and Struct
- Debugger
- Hot Patching
Module 3: Reversing Windows programs
- Registry Keys
- Manipulating Windows Registries
- Following an Algorithm with IDA
- Following an Algorithm with OllyDBG
- File Operations
- Process Operations
- Socket Operations
- Service Operations
Module 4: Obfuscation techniques
- Standard Obfuscation Algorithms
- Custom Obfuscation Algorithms
- Encryption Algorithms
Module 5: Antireversing techniques
- Antidisassembly techniques
- Antidebugger techniques
Module 6: Manual Unpacking
- Packers
- Finfing the Original Entry Point
- Tail Jump
- ESP trick
- SEH Handling
Final certification

