Malware Analyst Path
Become an expert in malware analysis:
From Malware Analyst to Reverse Engineer

 

Begin your journey to discover malware and learn how to study and analyze it with our certified courses, designed to guide you toward excellence.

  • University
    professors
  • 24/7 access to the course
  • Tests and assessment exercises 
  • Downloadable material
  • Final examination and certification

A Flexible and Comprehensive Training Program

Start with the basics and achieve excellence with our modular and flexible approach, designed to adapt to your needs and pace.

Malware Analyst Path

  • Image
    Dynamic Course
    Malware Analyst
  • Image
    Professional Course
    Reverse Engineer

Our Malware Analyst Path is designed to offer a tailored learning experience. Thanks to the modular structure of our courses, you can start with the Dynamic Malware Analyst Course to build a solid foundation, and continue with the Professional Reverse Engineer Course to acquire advanced skills.

Why participate in our malware analysis courses?

From Zero to Expert quickly and easily


Start with the Dynamic Malware Analyst course to learn how to analyze malware dynamically, and progress to the Reverse Engineer course, where you will learn the secrets of Assembly and discover how to identify malware behavior.

Realistic Simulation Laboratories


You will have access to sophisticated simulation labs designed to replicate complex cybersecurity scenarios. This controlled environment is ideal for experimenting and honing your skills without the risks of the real world.

Acquiring the skills to identify abnormal software behavior

You will learn the methods used by malware to execute malicious system calls, a critical skill for preventing and mitigating threats. This skill is essential for maintaining the integrity and security of your IT infrastructure.

You will receive constant support from the teacher

Our instructor Andrea Tassotti will guide you through the platform and answer all your questions

Unlimited Access to Content and Resources

Study without time constraints with content accessible online 24/7, allowing you to organize your studies around your other commitments. You will have all the material you need to prepare for the final exam, ensuring flexible training at your own pace.

You will obtain prestigious certifications

This path will lead you to obtain the Certified Dynamic Malware Analyst and Certified Professional Reverse Engineer certifications, which are internationally recognized and will increase your career opportunities.
Our Unique Methodology

Don't Just Pass the Exam
Become the Professional

Most courses prepare you to memorize answers. We transform you into a cybersecurity expert who can solve real problems from day one.

The S.T.E.P. UP Framework

Your proven path from beginner to professional

S
Study

Build solid foundations with structured, comprehensive learning materials

T
Train

Practice core skills through guided exercises and hands-on activities

E
Experiment

Learn by doing in safe environments where mistakes become lessons

P
Prove

Demonstrate your skills in realistic scenarios that mirror the real world

UP
Upgrade

Refine and elevate your expertise through continuous improvement

Each step builds on the previous one. You don't move forward until you've truly mastered the current level. This is how we guarantee you'll be job-ready, not just exam-ready.
100% Refunded Guarantee Seal

100% Money Back Guarantee

We are so confident in our S.T.E.P. UP Framework that we take all the financial risk. If you don't achieve your certification after 3 attempts within 12 months, we will provide a full refund of your investment. Your professional growth is our only priority.

The Teachers

Image

Antonio Capobianco, CEO of Fata Informatica, parent company of the CybersecurityUP brand and leader for over 30 years in the field of IT security.
He has an extensive background in academia, spanning Italy’s most elite institutions and currently lectures in Ethical Hacking and Malware Analysis at e-Campus University.
He is the author of the podcast ‘Cybersecurity & Cybercrime’.

The Company

Image
We were founded in 1994 with the aim of providing IT security services to Italian companies and public administrations.
We are the only Italian company to have been included by Gartner in its ‘Marketing Guide for IT monitoring tools’ thanks to our Sentinet3 product, developed in 2004 and now recognised as the leader in the Italian market.
We have created a business unit specialising in cybersecurity services, called CybersecurityUP, with the aim of providing vertical cybersecurity services to our customers, primarily the defence sector and companies of national strategic interest.
Image

Take your team beyond e-learning.

Our blended format adds live webinar sessions delivered by certified instructors — ideal for structured corporate training programs. Available for organizations through our authorized partners, with language and regional options.


100% Money-Back Guarantee

If you attempt the exam 3 times within your first year and don't achieve certification, you get a full refund. That's our commitment to your success.

Image

Course details

Dynamic Malware
Analyst Course (CDMA)

Course objectives


This course aims to train Malware Analysts capable of performing both static and dynamic analysis without the need to know assembler or use disassemblers or debuggers. During the course, participants will learn about the types of malware, the architecture of Windows systems and processes, the main primitives used for specific malware actions, and the probes to use to identify their behavior.



Introduction to Cybersecurity
  1. Cybersecurity
    1. Introduction
    2. The kill chain
    3. Analysis of an attack
Malware
  1. Introduction to Malware
    1. The PE Format
    2. DLLs
  2. Kernel Vs User Mode
    1. APIs
  3. Malware Characteristics
    1. Signatures
    2. Obfuscation and Mutation
    3. Polymorphic Malware
    4. Metamorphic Malware
    5. Mutation Engines
    6. Persistence
    7. DLL Hijacking
    8. Trojanized System Binaries
  4. Types of Malware
    1. Viruses
    2. Backdoors
    3. Adware
    4. Spyware
    5. Keyloggers
    6. Trojans
    7. RATs
    8. Cryptojacking
  5. Rootkits
  6. Ransomware & Co
  7. The Malware Market
Windows OS
  1. The Windows System

    1. Processes
    2. Virtual Address Space
    3. Threads
    4. Process Loading Stages
    5. Context Switching
    6. WOW64
    7. Main Windows Processes
      1. System Idle Process
      2. Registry
      3. Interrupts
      4. smss.exe
      5. Memory Compression
      6. svchost.exe
      7. csrss.exe
      8. wininit.exe
      9. winlogon
      10. lsass.exe
      11. services
      12. explorer
  2. Windows Primitives

    1. Process Manipulation
    2. File Manipulation
    3. Registry Manipulation
    4. Sockets
    5. DLL Loading
PE format
  1. RVA, VA and ImageBase
  2. The Headers
    1. DOS Header
    2. NT Header
    3. Optional Header
    4. Section Header
  3. The Sections
    1. .text
    2. .rdata
    3. .data
    4. .edata
    5. .rsrc
Static and Dynamic Analysis
  1. Static Analysis
    1. Antivirus Scanners
    2. Hashing
    3. Strings
    4. Packed Malware
    5. DLLs and Functions

  2. Dynamic Analysis
    1. Sandboxes
    2. Malware Execution
    3. Process Monitoring
    4. Registry Monitoring
    5. Network Simulation
    6. Packet Sniffing
Malware Behaviour
  1. Persistence Techniques
    1. Registry Keys
    2. File System
    3. Processes
    4. Services
  2. Injection Techniques
    1. DLL/Code Injection
    2. Image File Execution Options
    3. DLL Search Order Hijacking
    4. Process Injection
    5. Process Hollowing
    6. APC Injection
    7. Extra Window Memory Injection
  3. Hooking Techniques
    1. API Hooking
    2. IAT Hooking

Final certification
Image

Professional Reverse Engineer Course (CPRE)

Course objectives


Reverse engineering allows you to analyze and understand the inner workings of software. In the field of cybersecurity, it is crucial for studying malicious code and developing effective defenses. Large organizations concerned about the security of their data form specialized teams or hire experts to examine threats. This course teaches how to use reverse engineering techniques and tools to understand the behavior of code, through both static and dynamic analysis. Hands-on labs will help participants become proficient and autonomous in performing these analyses.

Module 1: Assembly language
  1. Assembly code 
  2. Instructions
  3. Functions and Stack 
  4. Architecture X64 
Module 2: Recognizing structures and loops in Assembly
  1. Loops and instructions 
  2. Array and Struct 
  3. Debugger 
  4. Hot Patching 
Module 3: Reversing Windows programs
  1. Registry Keys
  2. Manipulating Windows Registries
  3. Following an Algorithm with IDA
  4. Following an Algorithm with OllyDBG
  5. File Operations
  6. Process Operations
  7. Socket Operations
  8. Service Operations
Module 4: Obfuscation techniques
  1. Standard Obfuscation Algorithms
  2. Custom Obfuscation Algorithms
  3. Encryption Algorithms
Module 5: Antireversing techniques
  1. Antidisassembly techniques
  2. Antidebugger techniques
Module 6: Manual Unpacking 
  1. Packers
  2. Finfing the Original Entry Point
  3. Tail Jump
  4. ESP trick
  5. SEH Handling

Final certification
Image
Would you like to learn more about our courses and find out if there are any current promotions?

Fill in the form and one of our experts will get back to you as soon as possible.
load
submit