Forensics, Reverse Engineering and Exploitation

If you are interested in a range of “backroom” cybersecurity tasks such as reversing, vulnerability discovery, exploitation and forensics, these courses are for you.

Select Your Skill Level from the Options Below

Solid white background

Fundamental

Grasp the basics of triaging malware and software functionality, and pick up further skills in disassembly and decompilation. Learn simple exploitation techniques and how to spot such vulnerabilities in a variety of code.

Status: COMING SOON

  • A basic understanding of cybersecurity is recommended.

  • Certified Cybersecurity Research Associate

  • 1 month, online, with the option to attend weekly live consultation sessions

  • TBD

  • $200 / month

Blank white square background

Intermediate

Develop the mentality to identify "high-payoff" research tracks when reversing. Learn common anti-reversing tricks in malware. Develop approaches to deal with "live" malware campaigns and potentially exploit weaknesses in the killchain.

Status: COMING SOON

  • A basic understanding of cybersecurity is recommended.

  • Certified Cybersecurity Researcher

  • 1 month, online, with the option to attend weekly live consultation sessions

  • $1,300

  • $300 / month

small red triangle on a white background

Advanced

Work with complex software and more complex, C2-dependent malware employing advanced techniques. Hunt both for zero-day vulnerabilities, and perform research on artefacts from threat actors that might be employing zero-day techniques.

Status: COMING SOON

  • A basic understanding of cybersecurity is recommended.

  • Certified Cybersecurity Research Expert

  • 1 month, online, with the option to attend weekly live consultation sessions

  • TBD

  • $300 / month