Applied Reverse Engineering – A Hands-On Mini Bootcamp
Hands-on reverse engineering bootcamp covering static and dynamic malware analysis, debugging, and translating findings into YARA-based
🔍 Turn Malware Analysis into Actionable Detection
Malware doesn’t explain itself. You reverse it.
InfosecTrain’s 2-Day Applied Reverse Engineering Bootcamp is designed for cybersecurity professionals who want practical, tool-driven experience in dissecting malware, understanding its behavior, and extracting actionable intelligence.
📅 21 – 22 March 2026
🕘 7:00 PM – 11:00 PM (IST)
📌 What You’ll Gain
🔹 Hands-On Reverse Engineering – Inspect & analyze real binaries
🔹 Practical Lab Setup – Windows & Linux VMs with open-source tools
🔹 Industry Tools in Action – Work with real-world RE & debugging tools
🔹 Static & Dynamic Analysis – Understand malware before & during execution
🔹 Malware Behavior Analysis – File, registry, process & network actions
🔹 Detection-Oriented Learning – Convert findings into YARA rules
📘 Agenda | 🗓 Day 1
• Module 1: Introductory Concepts for Reverse Engineering
• Module 2: CPU Architecture & Assembly Essentials (x86/x64)
• Module 3: Static Analysis Fundamentals
📘 Agenda | 🗓 Day 2
• Module 4: Dynamic Analysis & Debugging Basics
• Module 5: Reverse Engineering Real-World Behaviors
• Module 6: Mini Malware Reverse Engineering Challenge
🎯 Key Takeaways
✅ Earn 8 CPE Credits
✅ Strong foundation in reverse engineering concepts
✅ Hands-on static & dynamic analysis experience
✅ Practical understanding of malware behavior
✅ Ability to write YARA rules from RE findings
✅ Exposure to real-world reverse engineering workflows
🔥 Go beyond alerts. Understand malware at its core.
🔒 Limited Seats Available
👉 Secure Your Spot Now: https://infosectrain.com/bootcamp/applied-reverse-engineering-bootcamp/?utm_source=eventbrite&utm_medium=eventbritebanner&utm_campaign=Reverse-engineering-bootcamp
Hands-on reverse engineering bootcamp covering static and dynamic malware analysis, debugging, and translating findings into YARA-based
🔍 Turn Malware Analysis into Actionable Detection
Malware doesn’t explain itself. You reverse it.
InfosecTrain’s 2-Day Applied Reverse Engineering Bootcamp is designed for cybersecurity professionals who want practical, tool-driven experience in dissecting malware, understanding its behavior, and extracting actionable intelligence.
📅 21 – 22 March 2026
🕘 7:00 PM – 11:00 PM (IST)
📌 What You’ll Gain
🔹 Hands-On Reverse Engineering – Inspect & analyze real binaries
🔹 Practical Lab Setup – Windows & Linux VMs with open-source tools
🔹 Industry Tools in Action – Work with real-world RE & debugging tools
🔹 Static & Dynamic Analysis – Understand malware before & during execution
🔹 Malware Behavior Analysis – File, registry, process & network actions
🔹 Detection-Oriented Learning – Convert findings into YARA rules
📘 Agenda | 🗓 Day 1
• Module 1: Introductory Concepts for Reverse Engineering
• Module 2: CPU Architecture & Assembly Essentials (x86/x64)
• Module 3: Static Analysis Fundamentals
📘 Agenda | 🗓 Day 2
• Module 4: Dynamic Analysis & Debugging Basics
• Module 5: Reverse Engineering Real-World Behaviors
• Module 6: Mini Malware Reverse Engineering Challenge
🎯 Key Takeaways
✅ Earn 8 CPE Credits
✅ Strong foundation in reverse engineering concepts
✅ Hands-on static & dynamic analysis experience
✅ Practical understanding of malware behavior
✅ Ability to write YARA rules from RE findings
✅ Exposure to real-world reverse engineering workflows
🔥 Go beyond alerts. Understand malware at its core.
🔒 Limited Seats Available
👉 Secure Your Spot Now: https://infosectrain.com/bootcamp/applied-reverse-engineering-bootcamp/?utm_source=eventbrite&utm_medium=eventbritebanner&utm_campaign=Reverse-engineering-bootcamp
Good to know
Highlights
- 1 day 4 hours
- Online