Mission  |  Books  |  Training  |  About Us  |  Contact

The Complete Malware Analysis Training to Build Irresistible Resume and Be The Expert of Your Response Team
The ZERO TO HERO training that will help you be on top of the cybersecurity ladder, get the salary income you deserve and be the #1 candidate for the next promotion
Complete Malware Analyst Career
Training
The ZERO TO HERO training that will help you build your irresistible resume and be the EXPERT in your response team.

 

The Complete Malware Incident Response Training
Build irresistible resume and be the expert of your response team
HANDS-ON TRAINING
The Complete Malware Analysis Career Training will take you step-by-step, with lots of hands-on practice, enabling you to learn malware analysis in a quick and simple training.

It only requires basic understanding of cybersecurity terminologies. Even if you haven’t written a single line of code before, don’t worry, this program is still for you.
HANDS-ON TRAINING
The Complete Malware Incident Response Training will take you step-by-step, with lots of hands-on practice, enabling you to learn malware analysis in a quick and simple training.

It only requires basic understanding of cybersecurity terminologies. Even if you haven’t written a single line of code before, don’t worry, this program is still for you.
This training is your beginner guide to get that malware analysis job you always dreamed of
THERE'S A BETTER WAY... AND THIS IS IT
I believe that malware analysis shouldn't have a big learning curve.

With other training, the learning resources can be scattered, not step-by-step, hard to learn, and target mainly developers. Malware analysis doesn't require programming experience, however the other online resources require it.

When I started, I was a mechanical engineering student. It took me 3 years to get a grip of that field and write my well-known Stuxnet Analysis report. 

As I went through the journey, it made me realize that learning malware analysis shouldn't be as hard as these resources are making it. It can take around 6 months part-time study to get a good understanding of this science and be an interview-ready candidate.
"I'm very grateful to Amr Thabet. With his program, I was able to land my first job in malware analysis after graduation in Trend Micro as a part of their Incident Response Team. Thank you again Amr for your effort in doing this course."
AbdelRahman Yasser
HANDS-ON TRAINING
The Complete Malware Analysis Career Training will take you step-by-step, with lots of hands-on practice, enabling you to learn malware analysis in a quick and simple training.

It only requires basic understanding of cybersecurity terminologies. Even if you haven’t written a single line of code before, don’t worry, this program is still for you.
HANDS-ON TRAINING
The Complete Malware Analysis Career Training will take you step-by-step, with lots of hands-on practice, enabling you to learn malware analysis in a quick and simple training.

It only requires basic understanding of cybersecurity terminologies. Even if you haven’t written a single line of code before, don’t worry, this program is still for you.
THERE'S A BETTER WAY... AND THIS IS IT
This training is your beginner guide to get that malware analysis job you always dreamed of
I believe that malware analysis shouldn't have a big learning curve.

With other training, the learning resources can be scattered, not step-by-step, hard to learn, and target mainly developers. Malware analysis doesn't require programming experience, however the other online resources require it.

When I started, I was a mechanical engineering student. It took me 3 years to get a grip of that field and write my well-known Stuxnet Analysis report. 

As I went through the journey, it made me realize that learning malware analysis shouldn't be as hard as these resources are making it. It can take around 6 months part-time study to get a good understanding of this science and be an interview-ready candidate.
Most of your peers already started learning malware analysis. Secure your next job position or your next promotion before it's taken.
Most of your peers already started learning malware analysis. Secure your next job position or your next promotion before it's taken
WHO AM I?
I'm Amr Thabet. I'm a malware researcher who worked in some of the top security companies such as Symantec. I analyzed multiple nation-state sponsored attacks including the NSA malware families (Stuxnet & Regin), North Korea (Contopee) and many other highly advanced attacks.

I have spoken in top security conferences all around the world including DEFCON, VB Conference and others and have been featured in Christian Science Monitor newspaper for my work on Stuxnet.

Prior to that, I struggled to get into the field as I was a mechanical engineer graduate. I didn't have the budget to afford expensive certificates to prove my skills. The lack of a degree in computer science or certificates in the field didn't stop me from proving my skills.

As malware analysis is one of most demanded jobs in cybersecurity and with my work on different projects as a proof of my skills, I was able to land my first job in malware analysis and build my career from there to the top.

I faced lots of demotivating voices telling me that I wouldn't be able to make it. And because of that, after my successes, I wanted to be the inspiring voice to all enthusiasts starting in malware analysis. I just want to create accessible content to everyone to learn malware analysis and not learn the hard way as I did with years of sleepless nights.

I help students of the field build their knowledge, their experience and most importantly, their irresistible resume to land their next malware analysis job. I also help incident handlers and DF analyzers take the next step in their career by building their malware analysis skill set and be the expert of their team.

THE INDUSTRY IS Screaming Malware
One of the most demanded skillset in cybersecurity is malware analysis.
It's not about new technologies or new policies, it's about hiring skilled professionals. 
WHO AM I?
I'm Amr Thabet. I'm a malware researcher who worked in some of the top security companies such as Symantec. I analyzed multiple nation-state sponsored attacks including the NSA malware families (Stuxnet & Regin), North Korea (Contopee) and many other highly advanced attacks.

I have spoken in top security conferences all around the world including DEFCON, VB Conference and others and have been featured in Christian Science Monitor newspaper for my work on Stuxnet.

Prior to that, I struggled to get into the field as I was a mechanical engineer graduate. I didn't have the budget to afford expensive certificates to prove my skills. The lack of a degree in computer science or certificates in the field didn't stop me from proving my skills.

As malware analysis is one of most demanded jobs in cybersecurity and with my work on different projects as a proof of my skills, I was able to land my first job in malware analysis and build my career from there to the top.

I faced lots of demotivating voices telling me that I wouldn't be able to make it. And because of that, after my successes, I wanted to be the inspiring voice to all enthusiasts starting in malware analysis. I just want to create accessible content to everyone to learn malware analysis and not learn the hard way as I did with years of sleepless nights.

I help students of the field build their knowledge, their experience and most importantly, their irresistible resume to land their next malware analysis job. I also help incident handlers and DF analyzers take the next step in their career by building their malware analysis skill set and be the expert of their team.

THE INDUSTRY IS Screaming Malware
One of the most demanded skillset in cybersecurity is malware analysis.
Yes, It's true. 

According to CyberEdge survey, the cybersecurity industry has investments up to $120 billion dollars (and will be more than $170B by 2020).

The 2 cyber threats that are causing the greatest concern are Malware and Ransomware (which is a type of malware). 

43% of cyber attacks these organizations are facing are Advanced Malware, APT Attacks or zero-day attacks.

The surprising fact is that these organizations are not investing in a new AI or the next generation anti-malware. These organizations believe the top reason of their problems is that they are missing the skilled security professionals to protect them.

82% of security professionals report a shortage of cybersecurity skills in their organizations and one in four believes that this skill gap resulted in loss of proprietary data.
It's not about new technologies or new policies, it's about hiring skilled professionals. 
In the last 2 years, the number of unfulfilled jobs in cybersecurity have doubled reaching 2 million unfulfilled jobs

This market is exploding with more and more jobs in cybersecurity and malware analysis and companies are looking for the right people to fulfill these jobs.
"I have finished the Malware Analyst Mindset Program with full satisfaction. He did a fantastic job with more than 60 hours of hands-on and practice which makes it one of the rare courses out there. Let me say: One OF THE BEST Courses I EVER HAD."
Yazeed Alabbad
How long do you want to waste from your time and career before you start?
join right now and build the career you always dreamt of
How long do you want to waste from your time and career before you start? 
join right now and build the career you always dreamt of
Time is of the essence
As you have seen, there is more and more investment in malware analysis talent in the cybersecurity industry and therefore, many of  your colleagues and peers are learning malware analysis and adding this skill to their arsenal to be more competitive in the job market. 

They understand that this is the future and it will be a required skill in incident handling, digital forensics and many other cybersecurity jobs. So, don't be left out, stay competitive in the cybersecurity job market and start building your malware analysis skills now.

Don't wait for the right opportunity, create it. The one thing that separates winners from the losers is, winners take action.
HERE'S WHAT YOU WILL LEARN
Module #1: APT Attacks and Malware Analysis Overview
Topics: 
  •  Understanding Advanced Persistent Threats (APT) 
  • ​Explore different attack vectors such as spear-phishing and hack the supply chain  
  • ​Dive deeper into the APT attack stages and the different types of malicious tools used in each stage  
  • ​Analyzing documents with malicious macros in a hands-on practice.
Goals:
The goal of this chapter is to help you, before diving into malware analysis, understand what type of attacks you are facing, how they work and what's the main goal of the malware analysis. After that, we will be looking into one of the first stage type of malware for getting our hands dirty in malware analysis and understand the basics of reverse engineering even before we learn assembly.
Duration: 3 hours
MODULE #2: incident response process
Topics: 
  • Understanding incident response process as a whole and what questions each step helps to answer.
  •  A brief introduction to log analysis and splunk and what questions they help to answer. (Hands-on practice) 
  •  Understanding different network protocols such as TCP, UDP, HTTP, DNS and more. 
  •  Examining a packet capture file (pcap) and detecting different attack patterns (Hands-on practice) 
  •  Analyzing a memory capture file and detecting suspicious processes, memory injections and other malicious activities from the memory capture file. (Hands-ons practice)
Goals:
The goal of this chapter is to help you understand the incident handling process and what’s your role as a malware analyst in this process. As many malware analysis jobs are within incident response teams, it’s important to understand your role within the team and every step in the whole process. Now, you will have a clear vision, goal and questions you have to answer and now you are ready to dive deeper into the malware analysis process. In this module you will also have a brief intro to log analysis and splunk, you will dive deep into packet analysis with different theoretical study and hands-on practice. And you will also learn how to perform memory analysis to detect suspicious processes, memory injections and other malicious activities and all of these skills are essential for being a successful malware analyst. 
Duration: 3 hours
MODULE #3: Malware Analysis Process
Topics: 
  • Understanding the malware process and what questions each step helps to answer 
  • Performing basic static analysis using PE header information and strings   
  • Unpacking malware with automated tools and techniques  
  • Performing behavioral analysis on different samples.  
  • Building your own malware analysis lab  
  • Analyzing Pony malware using basic static and behavioral analysis techniques (Hands-on Practice)
Goals:
The goal of this module is to help you understand the malware analysis process and understand what questions each step can help you answer. Understanding this will help you be a laser-focused reverse engineer which knows exactly what to look for and steps to take. This understanding will help you speed your malware analysis process along the way. Also, in this module you will learn the basic static analysis, how to unpack a malware and what information you can extract from the PE header and the malware strings. Also, you will learn the behavioral analysis of malware samples using different tools on your newly-built malware analysis lab.
Duration: 3 hours
MODULE #4: Static Analysis & Dynamic Code Analysis with x86 Assembly (Part 01 & Part 02)
Topics: 
  • Understanding core x86 assembly concepts to perform malicious code analysis 
  • Understanding how C code gets represented in x86 assembly and how to reverse engineer it back to C code   
  • Performing static analysis with IDA Pro (Hands-on Practice)  
  • Performing dynamic analysis with OllyDbg (Hands-on Practice) 
Goals:
This module is full of hands-on practice on x86 assembly analysis and reverse engineering. The main goal of this module is to get you familiar with x86 assembly and to sharpen your reverse engineering skills, static and dynamic code analysis skills.
Duration: 6 hours
MODULE #5: Windows Internals & Malware Analysis
Topics: 
  • Understanding Windows internals, processes, threads and process loading mechanism 
  • Understanding Dynamic Link Libraries (DLLs), Application Programming Interfaces (APIs) and the most common APIs used by malware 
  • A complete step-by-step analysis for China's Tibet nation-state attack. (Hands-on Practice) 
Goals:
The goal of this module is to understand the operating system role and its process creation mechanism. How Windows loads a PE file in memory, how it communicates with it and how the malware can use the Windows commands (APIs) to perform different malicious activities. This module is mainly a hands-on practice module to walk you through the analysis of a nation-state attack against tibet activists. By the end of this module, you will have enough skills ,and your first experience, to completely analyze a malware sample using static and dynamic code analysis techniques.
Duration: 3 hours
MODULE #6: Encryption and Encoding
Topics: 
  • Understanding different encryption algorithms from simple ones such as xor and sliding key encryption to more advanced ones such as AES and public key encryption (With Hands-on Practice) 
  • Examining RC4 encryption algorithm (the most widely used encryption algorithm by malware authors) (With Hands-on Practice)  
  • Learning 4 different manual unpacking techniques for custom unpacking. (With Hands-on Practice)
Goals:
By the end of this module, you will be able to deal with different encryption algorithms used inside any malware sample. Either to encrypt strings, API names, the network communication or any other information. You will also be able to unpack custom-packed malware manually using OllyDbg. As encryption is widely used by most of malware samples nowadays, analyzing encryption algorithms and unpacking malware is a must-have skill to be a successful malware analyst.
Duration: 3 hours
MODULE #7: Process Injection & Anti-Reversing Techniques
Topics: 
  • Understanding different types of process injection techniques used by malware 
  • Performing static and dynamic analysis on process injection functionality in malware (Hands-on Practice) 
  • Understanding different anti-reverse engineering techniques used by malware include debugger detection techniques, exception techniques, anti-VM techniques and many others.  
  • Performing dynamic code analysis using ollydbg despite of the anti-reverse engineering techniques and learning how to bypass them (Hands-on Practice) 
Goals:
The main goal of this module is to introduce you to more advanced techniques used by malware authors to escape detection and amateur reverse engineers. By the end of this module, you will be able to deal with these advanced techniques including process injection, anti-debugging techniques, anti-VM techniques and many others and you will be able to perform static and dynamic code analysis on more complex samples packed with multiple anti-reverse engineering techniques.
Duration: 3 hours
MODULE #8: Banking trojans and API Hooking
Topics: 
  • Understanding Man-in-The-Browser (MiTB) attacks and other different techniques used by banking trojans to transfer money to rogue accounts or steal credit card numbers. 
  • Understanding API and IAT hooking techniques commonly used by banking trojans to perform web injections
  • Performing static & dynamic code analysis on API hooking functionality inside Vawtrak banking trojan (Hands-on Practice) 
  • Examining a Point Of Sale (POS) malware using static code analysis techniques (Hands-on Practice)
Goals:
This module is dedicated to advanced cybercrime malware. By the end of this module, you will be able to analyze a banking trojan, understand its API hooking mechanisms and extract its web injection code that's used to modify banks' web pages to steal users' bank account details to transfer their money to other rogue accounts. You will also learn about Point Of Sale (POS) malware and how to perform static & dynamic analysis on them.
Duration: 3 hours
MODULE #9: Exploits And Shellcode
Topics: 
  • Understanding different types of vulnerabilities and exploits 
  • Analyzing different types of x86 shellcodes and their stages (Hands-on Practice)  
  • Examining a malicious office document packed with an exploit (Hands-on Practice) 
  • Examining a malicious PDF document packed with an exploit (Hands-on Practice)  
  • Exploring different tools and techniques to analyze the exploit and extract the shellcode. 
Goals:
In this module, we are back to the first stage of most APT attacks which is the exploit. By the end of this module, you will be able to analyze and dissect different document files, detecting the exploit and analyzing the functionality of its shellcode for better understanding of the delivery of the next stages in the attack. Also, you will understand privilege escalation vulnerabilities that is used later in the attack to give the attacker to access to more information to better ability to hide its tools. This module is packed with hands-on practice for you to improve your reverse engineering skills and to gain the experience of analyzing malicious documents and shellcode.
Duration: 3 hours
MODULE #10: Kernel-Mode ROotkits
Topics: 
  • Deep dive into windows kernel-mode internal and rootkits 
  • Examining different types of kernel-mode hooking including SSDT hooking, DKOM attacks and many others (Hands-on Practice)  
  • Understanding PatchGuard (KPP) and different bypassing techniques used in different APT attacks. 
  • Full analysis of Stuxnet's rootkit MRxNet (Hands-on Practice)  
  • Understanding the mechanism of kernel-mode process Injection (Hands-on Practice)
Goals:
This module is an essential module for you to understand the operating system structure and how all these moving parts work together and with the hardware. You will also learn how malware authors take advantage of different weaknesses in the operating system to hide their presence or take advantage of the full privileges inside the windows kernel. By the end of this module, you will be able to analyze a malicious kernel-mode rootkit and examine its hooking technique and you will gain a great experience analyzing Stuxnet’s rootkit MRxNet.
Duration: 3 hours
MODULE #11: Threat Intelligence & Machine Learning
Topics: 
  • Introduction to threat intelligence and goals behind it. 
  • Writing your own yara signatures. (Hands-on Practice)   
  • Dive deep into threat intelligence and connecting the dots.  
  • Connecting different samples to the same attackers/group through different techniques.  
  • Brief intro to machine learning and its role in threat intelligence, malware analysis and detection.  
  • Understanding different types of supervised and unsupervised algorithms.   
  • The key steps to build a successful machine learning algorithm for detecting malicious samples, detecting suspicious network packets or for whatever the goal of your project 
Goals:
In this module, you will get introduced to threat intelligence which became a hot topic right now. You will understand why organizations need threat intelligence and how to connect the small pieces of information to understand the full picture and the timeline of the attack. You will also learn about machine learning and AI and how they are used to help in malware analysis and detection. And last, you will learn how to write yara signatures for malware families and its variants with a small hands-on practice for it.
Duration: 2.5 hours
Malware Analysis Lab Virtual machine
This Virtual machine includes all necessary tools, plugins and scripts you need to analyze different malware samples & memory images.

This machine is very simple to import to your virtualization tool and it's compatible with VMWare, VirtualBox and VirtualPC. 
MALWARE ANALYSIS WORKBOOK
This is 100 pages Workbook that not only it gives you even more hands-on exercises with their step by step solutions to hone your skills more, but also, it gives you a guidance on how you should follow with each module.

It includes:
  • The main takeaways from each module, what exactly you should learn
  • How to follow with this module (what video to watch first, what chapters to read in the book, exercises to solve and additional resources to read as well)
  • Real world Samples as exercises with step-by-step solutions. Following the same strategies that were taught in the training and as well, introducing new tools and ideas to enrich your skills and knowledge
BONUS: MASTERING MALWARE ANALYSIS EBOOK
This book compliments the whole training program. This book provides you with the solutions to the most advanced techniques you may face while analyzing a sophisticated attack. 

This book will be your malware analysis bible while working in any company as it covers all common, not so common and rare cases you might face in real world covering different platforms other than Windows such as IoT (Linux), Android, Mac and iOS. It covers lots of different filetypes, scripting languages with problem and solution for every hard case you might face in real world

We will be delivering this book to your home and the eBook will be also provided to you through the membership area.
BONUS #2: Malware Analysis Report Template
This Malware Analysis Report Template is the best way to present your work professionally answering your manager questions, other teams questions and even CISO questions without getting into a techno-bubble or showing them you are an amateur malware analyst.

This report includes lots of important and crucial tips and advice to make your report understandable, professional, concise and show a good image of yourself as a malware analyst.

It's over 17 pages includes sections with specific questions for you to answer and fill, includes examples of how these questions should be filled out and how that all could be organized together in a way that is easy to find answers to different teams and parties questions.
Additional Information
PREREQUISITES
Goals:
In this module, we are back to the first stage of most APT attacks which is the exploit. By the end of this module, you will be able to analyze and dissect different document files, detecting the exploit and analyzing the functionality of its shellcode for better understanding of the delivery of the next stages in the attack. Also, you will understand privilege escalation vulnerabilities that is used later in the attack to give the attacker to access to more information to better ability to hide its tools. This module is packed with hands-on practice for you to improve your reverse engineering skills and to gain the experience of analyzing malicious documents and shellcode.
Who should register to this program?
Goals:
In this module, we are back to the first stage of most APT attacks which is the exploit. By the end of this module, you will be able to analyze and dissect different document files, detecting the exploit and analyzing the functionality of its shellcode for better understanding of the delivery of the next stages in the attack. Also, you will understand privilege escalation vulnerabilities that is used later in the attack to give the attacker to access to more information to better ability to hide its tools. This module is packed with hands-on practice for you to improve your reverse engineering skills and to gain the experience of analyzing malicious documents and shellcode.
price & payments
what will you receive?
Goals:
In this module, we are back to the first stage of most APT attacks which is the exploit. By the end of this module, you will be able to analyze and dissect different document files, detecting the exploit and analyzing the functionality of its shellcode for better understanding of the delivery of the next stages in the attack. Also, you will understand privilege escalation vulnerabilities that is used later in the attack to give the attacker to access to more information to better ability to hide its tools. This module is packed with hands-on practice for you to improve your reverse engineering skills and to gain the experience of analyzing malicious documents and shellcode.

Featured Image Headline

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Non eaque incidunt, quam voluptatem distinctio, dolor aliquam quasi nihil accusamus officiis, ratione necessitatibus vero officia iure iste similique.
GET STARTED TODAY
FOR ONLY $997
Right now you have 2 choices:
   Choice #1: you can take a leap of faith and invest in this training, start right now and build your career in malware analysis. Become #1 candidate for malware analysis, incident handling, threat intel or any reverse engineering related job.

    Choice #2: You do nothing, close this page and return back in the morning to your usual routine. Nothing will change if your career will stay where you are. You will not get the salary that you feel you deserve or the promotion you worked hard for. Life is all about choices and it's the time to make your own now
100% SAFE TO TRY OUT
Join us for the first 30 days...

If you feel for any reason this program is not for you...

If you feel this program will not teach you malware analysis in a simple and easy step-by-step guide...

With a vision of teaching you the real scenarios that you will see in the field and with real targeted malware that created a huge impact in the world, you can easily request your money back and enjoy your first 2 modules for absolutely FREEAnd you will still be part of the community and you can learn from the people there and improve your skills.

100% Money Back Guarantee
Join us for the first 30 days...

If you feel for any reason this program is not for you...

If you feel this program will not teach you malware analysis in a simple and easy step-by-step guide...

With a vision of teaching you the real scenarios that you will see in the field and with real targeted malware that created a huge impact in the world, you can easily request your money back and enjoy your first 2 modules for absolutely FREEAnd you will still be part of the community and you can learn from the people there and improve your skills.

Mission  |  Books  |  Training  |  About Us  |  Contact

18 Garnish Square, D15, Dublin, Ireland
©2020  MalTrak - All Rights Reserved.
CUSTOM JAVASCRIPT / HTML