Free & Affordable DFIR, OSINT, & Cybersecurity Training

Free & Affordable DFIR, OSINT, & Cybersecurity Training

  • About This Site
  • Newest Training Additions
  • Training Categories
  • Blog
    • Free & Affordable Training News Monthly
  • Current Discounts
  • Submit a Discount
  • Report a Broken Link
  • Subscribe
  • DFIR Merchandise
  • Community Events
Main Menu
  • About This Site
  • Newest Training Additions
  • Training Categories
  • Blog
    • Free & Affordable Training News Monthly
  • Current Discounts
  • Submit a Discount
  • Report a Broken Link
  • Subscribe
  • DFIR Merchandise
  • Community Events
  • Browse Categories
      • 119All Core Categories (Blue Background)
      • 337All Digital Forensics & Incident Response Categories (Purple Background)
      • 48Partner/Affiliate Training (Helps Support This Site)
  • Facebook
  • Twitter
  • LinkedIn
  • Mastodon
  • YouTube
  • Instagram
  • Bluesky
  • Buy Me a Coffee
Malware Analyst Professional – Level 1 (TrainSec)

Malware Analyst Professional – Level 1 (TrainSec)

Affordable ($1,000 or under)
All Digital Forensics & Incident Response Categories (Purple Background)Malware Analysis & Reverse Engineering
0 Reviews

Social Media

  • Twitter URL
  • LinkedIn URL

Training Features

Good for BeginnersHands-OnHas a Community or ForumLifetime Course AccessPayment Plan AvailableProof of Completion

Name & Affiliate Link*: Malware Analyst Professional – Level 1

Platform: TrainSec

Course Instructor: Uriel Kosayev

Cost: $350

Proof of Completion: Certification of Completion

Community/Forum: There is a Discord community

Topics Include:

  • Lab Setup
  • Deploying Flare-VM
  • Connecting to INetSim
  • Introduction to Code Reverse Engineering
  • Installing Visual Studio
  • Basic C Code
  • Basic Reverse Engineering
  • The PE Structure
  • Static Malware Analysis
  • Identifying File Types
  • Strings Extraction
  • Identifying Malicious Functionality
  • Packing Analysis
  • Dynamic Malware Analysis
  • Working with Process Explorer
  • Extracting IoC’s using Process Hacker
  • Working with Procmon
  • Monitoring WinAPI Functions using API Logger
  • Inspecting Process Command Line Line Parameters using CMD Watcher
  • Debugging DLL Files with IDA Disassembler
  • Malicious Documents Analysis
  • Analyzing Malicious PDF Files
  • Analyzing VBA Macros
  • YARA Rule Examples

*DFIR Diva is an affiliate of TrainSec and receives a small percentage of sales made through affiliate links that go toward keeping the site running.

DFIR Diva is an affiliate or partner of:

  • PluralSight
  • Humble Bundle
  • DFIR Science
  • TCM Security Academy
  • Hack The Box
  • Simply Cyber
  • Springer/Apress Books
  • Blue Cape Security
  • INE
  • The OSINTion
  • CSI Linux
  • Coursera
  • Udemy

HELP SUPPORT THIS SITE

Other Sites

  • DFIR Diva Blog
  • Community Events Site
  • Get Your Start in DFIR Scholarship Fund & Job Board
© 2021 - 2025 DFIR Diva
  • Facebook
  • Twitter
  • LinkedIn
  • Mastodon
  • YouTube
  • Instagram
  • Bluesky
  • Buy Me a Coffee

Looking for Discounts on Training, Books, and More? Check out the Current Discounts page.

Go ThereSubmit a Discount

Login

Lost your password?