HANCITOR (aka CHANITOR) is a prevalent malware loader that spreads through social engineering in theRead More
Total Course Videos
Total Course Hours
Malware Reverse Engineering is often thought to be a difficult field to "break into", mainly due to the requirement of first understanding Assembly language, before being able to analyse malware.
That's where we come in. Our courses are designed to walk a student through different sections of this industry, allowing for skillset enhancement through practical approaches. Additionally, all of our courses have been designed by Subject Matter Experts, with years of experience in the industry.
Custom Developed Malware allows a beginner analyst to focus on the core concepts of a sample, avoiding any pesky obfuscation that could detract attention from the technique
All of our courses take a practical approach to teaching, with most chapters split into a short theory section, followed by an in-depth practical analysis
Unless otherwise specified, all of our training material is focused around modern techniques and malware - so we will not be covering Stuxnet or the CryptoLocker Ransomware
We understand life can get in the way, and that's why we provide lifetime access to all of our courses. Whether you want to start today, tomorrow, or next year - it's up to you!
Currently our flagship course, Zero2Automated, contains a final examination and certification, provided to all students at no extra cost. We are planning on rolling this out across all courses
Sometimes you can run into that one "thing" you spend hours looking at, trying to figure it out. Whether through a course community or instructor support, we're here to help you progress
Everyone knows Cyber Security is constantly changing. We want our courses to reflect that, and as a result, we like to maintain our courses over time. From slight changes to remasters.
Loyalty is appreciated here, and that's why as an existing customer of ours, you will receive discount on all new courses - plus any additional benefits we roll out in the future, such as membership programs
Our training expands further than just online courses, including developing professional training tailored to your requirements, organizing conference workshops, and handling corporate requests.
If you are interested in any of the below, feel free to reach out!
Looking to purchase multiple licenses? We're happy to provide a quote and handle all registration if necessary. Bulk discounts are offered for larger purchases.
Need professional corporate training on a budget? We can develop high quality training tailored to your requirements, while not breaking the bank.
Looking for more personalized, one-on-one training as an individual? We're more than happy to work with you on developing a custom plan to fulfil your needs!
We always enjoy running our trainings at conferences, whether it is in a short workshop or a multi-day training format, so don't hesitate to contact us!
Struggling with recognizing algorithms in use by malware, or software
in general? Not sure of the difference between an RC4 subsitution table
and an AES one?
Get your free copy of our “Recognizing Encryption Algorithms”
With the rapid increase of ransomware usage over the past few years,
the need for reverse engineering and recognizing algorithms
has also risen. If you can understand the algorithm,
you can discover any weaknesses in it.
This book takes you through the most common Encryption Algorithms
found in malware nowadays, such as Salsa20, RSA, AES, and more! These
algorithms will be shown in the context of active malware families,
such as the REvil ransomware and the SendSafe SpamBot.
So what are you waiting for? Grab your copy now!
We produce a range of practical training for all skill levels. Whether you're an InfoSec Beginner, or an experienced Threat Researcher, we have the training to push you to the next level.
Each course is tailored to the skillset in mind.
The Beginner Malware Analysis Course starts off from the very basics; malware variants, x86 Assembly, malicious document analysis.
This progresses up to covering basic algorithm analysis, developing automation tools, and examining C2 protocols.
Zero2Automated takes it to the next level. Building upon previously covered algorithms, focusing on advanced static analysis of sophisticated malware, this course is suitable for those who have prior experience analysing malware, but perhaps are finding it difficult to enhance their skills in order to become an expert malware reverse engineer.
The latest 0ffset Training Solutions blog posts, covering all things malware analysis and reverse engineering.
Fill in your details to grab your copy of Recognizing Encryption Algorithms!
Stay updated on new course releases and related InfoSec content