CUSTOM JAVASCRIPT / HTML

Free On-Demand Masterclass Reveals

How To Shift Your Career To Cybersecurity And Become The Most Demanded Cybersecurity Professional in 2022

This Is The Step By Step Blueprint That Me And My Students Used To Build Our Career In Cybersecurity, Become The Go-To Expert In Our Teams And Get The Salary And The Recognition We Deserve

OUR MISSION

We help IT professionals and cybersecurity enthusiasts to shift their career to cybersecurity without sacrificing their financial situation or giving up their lifestyle

The number of malware attacks is undoubtedly on the risetargeting government, military, public and private sectors. These cyber-attacks focus on targeting individuals or organizations with an effort to extract valuable information, gaining money through a ransom or damaging their reputation.

Malware has become the top threat leading to data breaches according to FireEye Cyber Trendscape Report 2020 which could cost up to €20 million in fines, or up to 4% of the annual worldwide turnover of the preceding financial year, whichever is greater.

Small & med-sized businesses are not far from the threat. 22% of small-med-sized businesses that experienced a ransomware attack ceased business operations immediately and 55% of them that lose data become unprofitable within 30 days. (Sources: HelpNetSecurity & Better Business Bureaus 2017)

With these shocking numbers, detecting and responding to malware attacks become an essential skill for any response team.

The strategies, skills, and tools required to analyze malicious software are essential to detect, investigate and defend against such attacks.

We equip cybersecurity professionals & companies with the training, tools and processes to help them respond to such attacks and better protect their assets

"Before the training, I was always feeling that malware is a very scary thing and is a very out of  hand event. This training helped me in analyzing and recognizing the malware features and if it's getting to the perimeter. And now, I feel it’s not scary anymore. I can actually analyze it, understand it and control it."
- Fung Dao Ying, System Analyst in Bintulu Port
"I'm very grateful to Amr Thabet. With his program, I was able to land my first job in malware analysis after graduation in Trend Micro as a part of their Incident Response  Team. Thank you again Amr for your effort in doing this course."
- AbdelRahman Yasser, Trend Micro

Follow Me on Social Media

CUSTOM JAVASCRIPT / HTML

WEBINARS

Live Webinars

This is the roadmap on how to build your career in cybersecurity, get with the salary and the recognition you deserve and be the go-to expert in your organization or team

30/03/20

On-Demand Webinars

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

Webinars

Upcoming Webinars

How to Shift your career to cybersecurity Without Sacrificing Your Financial Situation Or Giving Up Your Lifestyle

This is The Step By Step Blueprint That me And My Students Used To Build Our Career In Cybersecurity, Become The Go-To Expert In Our Teams and Get The Salary And The Recognition We Deserve

February 10, 2022 - 7 PM GMT

On-Demand Webinars

The Most Demanded Cybersecurity Skill that companies are hiring for in 2021

Here is the step by step blueprint that I and my students used to become the go-to expert in our teams, build our career in cybersecurity, get with the salary and the recognition we deserve

The 3 Most required Penetration Testing Skills in 2021

This is the step by step blueprint to stand out from all the crowd in the penetration testing job market and be the go-to expert for your organization

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

WEBINARS

Live Webinars

This is the roadmap on how to build your career in cybersecurity, get with the salary and the recognition you deserve and be the go-to expert in your organization or team

30/03/20

On-Demand Webinars

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

BOOKS

mastering malware analysis book

This book will be your malware analysis bible while working in any company. It covers all common, not so common and rare cases you might face in the real world. It covers different platforms from Windows To IoT (Linux), Android, Mac and iOS. 

It covers lots of different file types, scripting languages with a solution to every hard case you might face in the real world including  the most advanced techniques you may face while analyzing a sophisticated attack.
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Most of your peers already started learning malware analysis. Secure your next job position or your next promotion before it's taken.

WEBINARS

This is the roadmap on how to build your career in cybersecurity, get with the salary and the recognition you deserve and be the go-to expert in your organization or team

30/03/20

On-Demand Webinars

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

TRAINING

Live Training

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

Hands-on Malware Analysis & Incident Response

This is a practical malware analysis training full of hands-on labs and exercises to help you analyze and contains APT attacks and ransomware attacks

With adversaries getting sophisticated and carrying out advanced malware attacks, detecting and responding to such intrusions is critical for cyber security professionals. 

The knowledge, skills, and tools required to analyze malicious software are essential to detect, investigate and defend against such attacks.

This training takes you on a journey in the topic of malware analysis covering targeted attacks and ransomware attacks with their techniques, strategies, and the best practices to respond to them. 

The training is full of hands-on labs on performing malware analysis, Rootkit analysis, and full attack investigations with different real-world samples.

In-Depth Digital Investigation & APT Threat Hunting

This live hands-on training focuses on in-depth investigation through the logs, memory and digital forensics artifacts to detect, investigate and hunt for the targeted attacks, APT attacks and ransomware attacks

April 25 - 28, 2022 (4 days)

With the rise of APT attacks and targeted ransomware attacks, there's a huge need for in-depth investigation & threat hunting skills to detect these attacks early on before the cost of the breach gets doubled every day.

In this training, you will learn how real APT attacks and targeted attacks work, how to in-depth investigation through collecting key artifacts, performing live forensics, memory forensics, and how to automate this across the whole enterprise in Powershell.

As well, you will learn how to perform threat hunting based on the MITRE ATT&CK framework and powered by threat intelligence. Not just the Attackers' IoCs but their tactics, techniques and procedures.

Hands-on Malware Analysis & Incident Response

This is a practical malware analysis training full of hands-on labs and exercises to help you analyze and contains APT attacks and ransomware attacks

With adversaries getting sophisticated and carrying out advanced malware attacks, detecting and responding to such intrusions is critical for cyber security professionals. 

The knowledge, skills, and tools required to analyze malicious software are essential to detect, investigate and defend against such attacks.

This training takes you on a journey in the topic of malware analysis covering targeted attacks and ransomware attacks with their techniques, strategies, and the best practices to respond to them. 

The training is full of hands-on labs on performing malware analysis, Rootkit analysis, and full attack investigations with different real-world samples.

Hands-on Malware Analysis & Incident Response

This is a practical malware analysis training full of hands-on labs and exercises to help you analyze and contains APT attacks and ransomware attacks

June 13 - 16, 2022 (4 days)

With adversaries getting sophisticated and carrying out advanced malware attacks, detecting and responding to such intrusions is critical for cyber security professionals. 

The knowledge, skills, and tools required to analyze malicious software are essential to detect, investigate and defend against such attacks.

This training takes you on a journey in the topic of malware analysis covering targeted attacks and ransomware attacks with their techniques, strategies, and the best practices to respond to them. 

The training is full of hands-on labs on performing malware analysis, Rootkit analysis, and full attack investigations with different real-world samples.
"Before the training, I was always feeling that malware is a very scary thing and is a very out of  hand event. This training helped me in analyzing and recognizing the malware features and if it's getting to the perimeter. And now, I feel it’s not scary anymore. I can actually analyze it, understand it and control it."
- Fung Dao Ying, System Analyst in Bintulu Port

Hands-on Malware Analysis & Incident Response

This is a practical malware analysis training full of hands-on labs and exercises to help you analyze and contains APT attacks and ransomware attacks

With adversaries getting sophisticated and carrying out advanced malware attacks, detecting and responding to such intrusions is critical for cyber security professionals. 

The knowledge, skills, and tools required to analyze malicious software are essential to detect, investigate and defend against such attacks.

This training takes you on a journey in the topic of malware analysis covering targeted attacks and ransomware attacks with their techniques, strategies, and the best practices to respond to them. 

The training is full of hands-on labs on performing malware analysis, Rootkit analysis, and full attack investigations with different real-world samples.

Advanced Red Teaming: Weaponization & Adversary Simulation

This is a practical malware analysis training full of hands-on labs and exercises to help you analyze and contains APT attacks and ransomware attacks

Aug 22 - 25, 2022 (4 days)

Advanced Red Teaming: Weaponization & Adversary Simulation is a hands-on offensive training that focuses on helping organizations battle against ever-growing targeted attacks and ransomware attacks by simulating their adversaries and put your defenses and your blue team at test to improve the organization security posture.

This training focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your organization's overall detections

WEBINARS

This is the roadmap on how to build your career in cybersecurity, get with the salary and the recognition you deserve and be the go-to expert in your organization or team

30/03/20

On-Demand Webinars

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

30/03/20

On-Demand Training (Pre-recorded)

Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu
Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu/ Nam libero tempore, cum soluta nobis est eligendi optio cu

Malware Incident Response Training (MIRT)

The zero to hero training for building your expertise in malware analysis & incident Response

This online pre-recorded training will take you step-by-step, with lots of hands-on practice, enabling you to learn malware analysis in a quick and simple training.

It only requires basic understanding of cybersecurity terminologies. Even if you haven’t written a single line
of code before, don’t worry, this program is still for you.
"I have finished the Malware Analyst Mindset Program with full satisfaction. He did a fantastic job with more than 60 hours of hands-on and practice which makes it one of the  rare courses out there. Let me say: One OF THE BEST Courses I EVER HAD"
- Yazeed Alabbad, Managed Cybersecurity Services Manager

In-Depth Red Teaming: APT & Adversary Simulation

The in-depth offensive training that will help you build your own cyber weapon and test organizations' security defences against real world APT attacks

In-Depth Red Teaming: APT & Adversary Simulation is a hands-on offensive training that focuses on helping organizations battle against ever-growing targeted attacks and ransomware attacks by simulating their adversaries and put your defenses and your blue team at test to improve the organization security posture.

This training focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your organization's overall detections

How long do you want to waste from your time and career before you start?
join right now and build the career you always dreamt of

Our Team

Amr Thabet

Amr Thabet is a malware researcher and an incident handler with over 10 years of experience, he worked in some of the Fortune 500 companies including Symantec, Tenable, and others. 

He is the founder of MalTrak and the author of "Mastering Malware Analysis" published by Packt Publishing.

Amr has spoken at top security conferences all around the world, including DEFCON, Hack In Paris and VB Conference. He was also featured in Christian Science Monitor for his work on Stuxnet.

His mission is to help security professionals all around the world to build their expertise in malware analysis, threat hunting, red teaming. and most importantly, protect their organization's infrastructure from targeted attacks, ransomware attacks, and APT attacks.

GET IN TOUCH

Ask us anything, We are always here to help.

CUSTOM JAVASCRIPT / HTML

Mission  |  Books  |  Training  |  About Us  |  Contact

18 Garnish Square, D15, Dublin, Ireland
©2020  MalTrak - All Rights Reserved.
CUSTOM JAVASCRIPT / HTML