
Forensics, Reverse Engineering and Exploitation
If you are interested in a range of “backroom” cybersecurity tasks such as reversing, vulnerability discovery, exploitation and forensics, these courses are for you.
Select Your Skill Level from the Options Below
Fundamental
Grasp the basics of triaging malware and software functionality, and pick up further skills in disassembly and decompilation. Learn simple exploitation techniques and how to spot such vulnerabilities in a variety of code.
Status: COMING SOON
-
A basic understanding of cybersecurity is recommended.
-
Certified Cybersecurity Research Associate
-
1 month, online, with the option to attend weekly live consultation sessions
-
TBD
-
$200 / month
Intermediate
Develop the mentality to identify "high-payoff" research tracks when reversing. Learn common anti-reversing tricks in malware. Develop approaches to deal with "live" malware campaigns and potentially exploit weaknesses in the killchain.
Status: COMING SOON
-
A basic understanding of cybersecurity is recommended.
-
Certified Cybersecurity Researcher
-
1 month, online, with the option to attend weekly live consultation sessions
-
$1,300
-
$300 / month
Advanced
Work with complex software and more complex, C2-dependent malware employing advanced techniques. Hunt both for zero-day vulnerabilities, and perform research on artefacts from threat actors that might be employing zero-day techniques.
Status: COMING SOON
-
A basic understanding of cybersecurity is recommended.
-
Certified Cybersecurity Research Expert
-
1 month, online, with the option to attend weekly live consultation sessions
-
TBD
-
$300 / month