00 +

Total Students

00 +

Total Course Videos

00 +

Total Course Hours

00 +

Samples Reversed

Our Courses

Malware Reverse Engineering

Malware Reverse Engineering is often thought to be a difficult field to "break into", mainly due to the requirement of first understanding Assembly language, before being able to analyse malware.

That's where we come in. Our courses are designed to walk a student through different sections of this industry, allowing for skillset enhancement through practical approaches. Additionally, all of our courses have been designed by Subject Matter Experts, with years of experience in the industry. 

Custom Malware

Custom Developed Malware allows a beginner analyst to focus on the core concepts of a sample, avoiding any pesky obfuscation that could detract attention from the technique

Practical Focus

All of our courses take a practical approach to teaching, with most chapters split into a short theory section, followed by an in-depth practical analysis

Relevant Content

Unless otherwise specified, all of our training material is focused around modern techniques and malware - so we will not be covering Stuxnet or the CryptoLocker Ransomware

Lifetime Access

We understand life can get in the way, and that's why we provide lifetime access to all of our courses. Whether you want to start today, tomorrow, or next year - it's up to you!

Certification

Currently our flagship course, Zero2Automated, contains a final examination and certification, provided to all students at no extra cost. We are planning on rolling this out across all courses

Course Support

Sometimes you can run into that one "thing" you spend hours looking at, trying to figure it out. Whether through a course community or instructor support, we're here to help you progress

Updated Content

Everyone knows Cyber Security is constantly changing. We want our courses to reflect that, and as a result, we like to maintain our courses over time. From slight changes to remasters.

Future Discounts

Loyalty is appreciated here, and that's why as an existing customer of ours, you will receive discount on all new courses - plus any additional benefits we roll out in the future, such as membership programs

Looking for something else?

Our training expands further than just online courses, including developing professional training tailored to your requirements, organizing conference workshops, and handling corporate requests.
If you are interested in any of the below, feel free to reach out!

Corporate Packages

Looking to purchase multiple licenses? We're happy to provide a quote and handle all registration if necessary. Bulk discounts are offered for larger purchases.

Tailored Training

Need professional corporate training on a budget? We can develop high quality training tailored to your requirements, while not breaking the bank.

Private One-On-One

Looking for more personalized, one-on-one training as an individual? We're more than happy to work with you on developing a custom plan to fulfil your needs!

Conference Workshops

We always enjoy running our trainings at conferences, whether it is in a short workshop or a multi-day training format, so don't hesitate to contact us!

Shape Image
Shape Image

Recognizing Encryption Algorithms

Struggling with recognizing algorithms in use by malware, or software
in general? Not sure of the difference between an RC4 subsitution table
and an AES one?

Get your free copy of our “Recognizing Encryption Algorithms
E-Book!

With the rapid increase of ransomware usage over the past few years,
the need for reverse engineering and recognizing algorithms
has also risen. If you can understand the algorithm,
you can discover any weaknesses in it.

This book takes you through the most common Encryption Algorithms
found in malware nowadays, such as Salsa20, RSA, AES, and more! These
algorithms will be shown in the context of active malware families,
such as the REvil ransomware and the SendSafe SpamBot.

So what are you waiting for? Grab your copy now!

Our Course Range


We produce a range of practical training for all skill levels. Whether you're an InfoSec Beginner, or an experienced Threat Researcher, we have the training to push you to the next level.

Each course is tailored to the skillset in mind.

The Beginner Malware Analysis Course starts off from the very basics; malware variants, x86 Assembly, malicious document analysis.
This progresses up to covering basic algorithm analysis, developing automation tools, and examining C2 protocols.

Zero2Automated takes it to the next level. Building upon previously covered algorithms, focusing on advanced static analysis of sophisticated malware, this course is suitable for those who have prior experience analysing malware, but perhaps are finding it difficult to enhance their skills in order to become an expert malware reverse engineer.

The Beginner Malware Analysis Course

£39.99

  • Beginner Focused
  • Practical Approach
  • Relevant Content
  • Lifetime Access
  • Course Certification
  • Slack Channel
Get Started

Zero2Automated

£149.99

  • Advanced Focus
  • Practical Approach
  • Custom Samples
  • Course Certification
  • Slack Channel
  • Lifetime Access
Get Started

Malware Analysis Courses - Coming Soon...

£???

  • Lifetime Access
  • Practical Approach
  • Custom Samples
  • Course Certification
  • Course Community
  • Content Support
Let me know!

Student Testimonials

Danus Minimus
Danus MinimusCourse Student
Read More
I really want to give a shout out to @0verfl0w_ and @VK_Intel for their #Zero2Auto Malware course. Having access to a well organized syllabus which structurally teaches malware analysis, and not to mention automation. I am one happy researcher.
Johnny Belinda
Johnny BelindaCourse Student
Read More
This course is really worth it! When last time I checked SANS course FOR610 with info from 2016 it cost around 7k and I'm quite not sure is it even worth the amount of money zero2auto costs
Jason
JasonCourse Student
Read More
Zero to Automated is a natural progression to SANS FOR610, expanding on the analysis of malware obfuscation techniques by dissecting the most prolific and pervasive malware families in use by cybercrime campaigns today.
Rey Bango
Rey BangoCourse Student
Read More
Be sure to check out the course Zero2Auto from @0verfl0w_ & @VK_Intel. I’ve signed up for it myself based on the excellent syllabus. It’s malware analysis and RE related.
Felipe Duarte
Felipe DuarteCourse Student
Read More
Such an excellent content. This is a must if you want to understand the real power of analyzing malware. It offers up-to-date content and very detailed explanations including notorious malware samples such as Qakbot and IcedID. The whole course is organized in such a way that it makes you grasp the key concepts of reverse engineering cyber threats, without going crazy. Absolutely love it.
Chuong Dong
Chuong DongCourse Student
Read More
Most courses I found on malware analysis were either too basic/general or they did not have much hands-on practice at all. Z2A is completely different because it’s really practical and decently challenging. The theory of most covered topic can be found online, but the full walkthrough of malware samples that use those techniques in this course is invaluable. I would say this course is probably one of the best investments I have made to learn RE!
4rchibald
4rchibaldCourse Student
Read More
The Advanced Malware Analysis Course is a great way to learn Malware Analysis with recent malware, as well as having competent people explaining how it works and how they deal with this stuff daily.
Previous
Next

Latest Blog Posts

The latest 0ffset Training Solutions blog posts, covering all things malware analysis and reverse engineering. 

blog image

SQUIRRELWAFFLE – Analysing The Main Loader

This is a follow up for my last post on unpacking SQUIRRELWAFFLE’s custom packer. In

Read More
blog image

SQUIRRELWAFFLE – Analysing the Custom Packer

In the last month, I have heard and seen a lot about SQUIRRELWAFFLE on Twitter,

Read More
blog image

Quack Quack: Analysing Qakbot’s Browser Hooking Module – Part 1

Qakbot is one of the most notorious malware families currently operating, and dates back to

Read More

get my copy!

Fill in your details to grab your copy of Recognizing Encryption Algorithms!

Receive the latest news

Subscribe & Stay Tuned

Stay updated on new course releases and related InfoSec content