Applied Reverse Engineering – A Hands-On Mini Bootcamp

Applied Reverse Engineering – A Hands-On Mini Bootcamp

Online event
Saturday, Apr 4 at 7 pm GMT+5:30 to Sunday, Apr 5 at 11 pm GMT+5:30 GMT+5
Overview

Hands-on reverse engineering bootcamp covering static and dynamic malware analysis, debugging, and translating findings into YARA-based

🔍 Turn Malware Analysis into Actionable Detection


Malware doesn’t explain itself. You reverse it.

InfosecTrain’s 2-Day Applied Reverse Engineering Bootcamp is designed for cybersecurity professionals who want practical, tool-driven experience in dissecting malware, understanding its behavior, and extracting actionable intelligence.


📅 21 – 22 March 2026

🕘 7:00 PM – 11:00 PM (IST)


📌 What You’ll Gain

🔹 Hands-On Reverse Engineering – Inspect & analyze real binaries

🔹 Practical Lab Setup – Windows & Linux VMs with open-source tools

🔹 Industry Tools in Action – Work with real-world RE & debugging tools

🔹 Static & Dynamic Analysis – Understand malware before & during execution

🔹 Malware Behavior Analysis – File, registry, process & network actions

🔹 Detection-Oriented Learning – Convert findings into YARA rules


📘 Agenda | 🗓 Day 1


• Module 1: Introductory Concepts for Reverse Engineering

• Module 2: CPU Architecture & Assembly Essentials (x86/x64)

• Module 3: Static Analysis Fundamentals


📘 Agenda | 🗓 Day 2


• Module 4: Dynamic Analysis & Debugging Basics

• Module 5: Reverse Engineering Real-World Behaviors

• Module 6: Mini Malware Reverse Engineering Challenge


🎯 Key Takeaways


✅ Earn 8 CPE Credits

✅ Strong foundation in reverse engineering concepts

✅ Hands-on static & dynamic analysis experience

✅ Practical understanding of malware behavior

✅ Ability to write YARA rules from RE findings

✅ Exposure to real-world reverse engineering workflows


🔥 Go beyond alerts. Understand malware at its core.

🔒 Limited Seats Available


👉 Secure Your Spot Now: https://infosectrain.com/bootcamp/applied-reverse-engineering-bootcamp/?utm_source=eventbrite&utm_medium=eventbritebanner&utm_campaign=Reverse-engineering-bootcamp

Hands-on reverse engineering bootcamp covering static and dynamic malware analysis, debugging, and translating findings into YARA-based

🔍 Turn Malware Analysis into Actionable Detection


Malware doesn’t explain itself. You reverse it.

InfosecTrain’s 2-Day Applied Reverse Engineering Bootcamp is designed for cybersecurity professionals who want practical, tool-driven experience in dissecting malware, understanding its behavior, and extracting actionable intelligence.


📅 21 – 22 March 2026

🕘 7:00 PM – 11:00 PM (IST)


📌 What You’ll Gain

🔹 Hands-On Reverse Engineering – Inspect & analyze real binaries

🔹 Practical Lab Setup – Windows & Linux VMs with open-source tools

🔹 Industry Tools in Action – Work with real-world RE & debugging tools

🔹 Static & Dynamic Analysis – Understand malware before & during execution

🔹 Malware Behavior Analysis – File, registry, process & network actions

🔹 Detection-Oriented Learning – Convert findings into YARA rules


📘 Agenda | 🗓 Day 1


• Module 1: Introductory Concepts for Reverse Engineering

• Module 2: CPU Architecture & Assembly Essentials (x86/x64)

• Module 3: Static Analysis Fundamentals


📘 Agenda | 🗓 Day 2


• Module 4: Dynamic Analysis & Debugging Basics

• Module 5: Reverse Engineering Real-World Behaviors

• Module 6: Mini Malware Reverse Engineering Challenge


🎯 Key Takeaways


✅ Earn 8 CPE Credits

✅ Strong foundation in reverse engineering concepts

✅ Hands-on static & dynamic analysis experience

✅ Practical understanding of malware behavior

✅ Ability to write YARA rules from RE findings

✅ Exposure to real-world reverse engineering workflows


🔥 Go beyond alerts. Understand malware at its core.

🔒 Limited Seats Available


👉 Secure Your Spot Now: https://infosectrain.com/bootcamp/applied-reverse-engineering-bootcamp/?utm_source=eventbrite&utm_medium=eventbritebanner&utm_campaign=Reverse-engineering-bootcamp

Good to know

Highlights

  • 1 day 4 hours
  • Online

Location

Online event

Organized by
i
infosectrain
Followers--
Events571
Hosting6 years
Report this event