Static and dynamic malware analysis: Ghidra, x64dbg, ANY.RUN, YARA rules and report writing.
Why this matters right now
450,000 new malware samples appear every day
After the course you will be able to
Not abstract knowledge — concrete skills for analyzing real malware
Real attacks in the course
Analyzing real malware — WannaCry, Emotet and APT samples
WannaCry — kill-switch found in static analysis
Researcher MalwareTech spent 20 minutes in static analysis and found a hardcoded URL — WannaCry's kill-switch. Registering the domain for $10 stopped the global epidemic.
Emotet — 3 weeks of deobfuscation
Emotet used multi-layer obfuscation: packed → VBA macro → PowerShell → .NET → shellcode. The full analysis chain took the Malwarebytes team 3 weeks.
YARA rule caught a new strain in 6 hours
An analyst wrote a YARA rule based on an old sample analysis. 6 hours later the rule triggered on a new strain of the same family in a corporate network.
Course Program
3 modules · 15 lessons: from sandbox to Ghidra and x64dbg
Where this course leads
Malware Analysis — the pinnacle of defensive security careers
Malware Analyst
Analyze new malware samples, write YARA rules, create antivirus signatures and publish technical reports.
Reverse Engineer
Reverse-engineer malicious code, research zero-day exploits, work in Threat Intelligence teams at top companies.
Threat Intelligence
Track APT groups, analyze their TTPs through malware, publish threat reports and help SOC teams set up detection.
Who this course is for
Malware Analysts
Want to systematically learn analysis methodology — from simple strings to full reverse engineering in Ghidra.
DFIR Specialists
Investigating incidents and need skills for quick triage of malicious samples during investigations.
Blue Team
Want to understand attacker behavior at code level to write more precise detection and YARA rules.
Reverse malware
like a researcher
today
15 lessons, Ghidra, x64dbg and real WannaCry and Emotet samples. Become a malware analyst.
Malware Analysis Basics
Level: advanced

