Course Description

The volume and complexity of malware threats continue to grow every year. Organizations need skilled analysts who can identify, dissect, and understand malicious code to determine what it does, how it got there, and how to defend against it. This type of work requires more than general IT knowledge, it demands specialized skills in reverse engineering, malware behavior analysis, and threat intelligence.

Cyber5W Malware Analyst Training is designed to guide students through the full malware analysis process, from static and dynamic analysis to extracting IOCs and writing professional malware reports. Using an experiential learning approach, students investigate real-world malware cases in a controlled environment, gaining the practical experience necessary to analyze, interpret, and respond to threats effectively.

This training covers core content required to pursue the upcoming Cyber5W Certified Malware Analyst (CCMA) certification and includes topics such as PE file analysis, debugging, injection techniques, shellcode, obfuscation, YARA rules, and more.

Training Delivery Details

Live Training: Instructor (40 hour) | Materials | Certification Exam

The course material includes over 55+ Hands-on Labs and Exercises

All sessions starts from 9 AM to 1 PM (Eastern Time) or upon a mutual agreement

Pricing Options

🎉 Early Bird Discount: Special pricing available for early registrants each training!
Use the discount codes below and receive 40% off while seats last.

  • C5W MALWARE ANALYSIS - VIRTUAL LIVE TRAINING

    October 6th, 2025

  • 40% Off If You Register Before September 1st! Use code earlymalware1025 at checkout to claim your discount.

  • $2,250.00

    Buy Now
  • C5W MALWARE ANALYSIS - VIRTUAL LIVE TRAINING

    December 1st, 2025

  • 40% Off If You Register Before November 1st! Use code earlymalware1225 at checkout to claim your discount.

  • $2,250.00

    Buy Now
  • C5W MALWARE ANALYSIS - VIRTUAL LIVE TRAINING

    February 2nd, 2026

  • 40% Off If You Register Before January 1st! Use code earlymalware0226 at checkout to claim your discount.

  • $2,250.00

    Buy Now

Syllabus

After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.

1. Introduction to Malware Analysis

2. Working with a Sandbox and Different Analysis Tools

3. PE File Analysis

4. Assembly x86/x64 Crash Course

5. Reverse Engineer and Debugging Malware

6. Analyzing Different Injection Techniques

7. Malware Persistence Mechanisms

8. Obfuscation and Anti-Analysis Techniques

9. Analyzing Malware Armed with Shellcode

10. Analyzing Managed Code (readable/uncompiled)

11. Extracting IOCs and writing YARA Rules

12. Writing Reports

Instructor

Cyber 5W Team

CCMA Certificate

  • Slide Notes & Lab Documents

    Training material including the course slides, lab documents, and references for further reading.

  • Malware Samples

    A copy of all the malware samples used during the training. Many of the samples have been custom built for the training.

  • Certificates

    At the end of the course, you will receive a Certificate of Completion that proves you have attended the course.

    However, to obtain our C5W Certified Malware Analyst certification you will be required to take an exam.

Learning Objectives

After completing this course, the student will be able to perform the following:

  • Ability to Analyze Malware using Different Tools and Sandboxes

  • Learn assembly x86/x64

  • Learn how to reverse engineer and debug malware

  • Ability to analyze malware with different injection techniques

  • Learn about malware persistence, obfuscation, and anti-analysis techniques

  • Learn how to locate and analyze malware using shellcode

  • Ability to analyze malware written using managed languages, such as: .NET, HTA, VBScript, Python, and JavaScript

  • Ability to extract IOCs from malware samples and turn them into YARA rules

  • Learn how to write malware analysis reports

Prerequisites

This course is designed for learners with no prior experience in malware analysis. However, having a basic understanding of computer science concepts, including operating systems, programming, or assembly language, is highly recommended to maximize your learning experience.

Note: Learners must be comfortable installing software and working with virtual machines using a hypervisor (e.g., VMware, VirtualBox). You should be able to independently set up and manage virtual environments, as this will be essential for completing the hands-on labs.

The Value of the Training

Unlock the skills needed to identify, analyze, and understand modern malware threats in a hands-on, guided environment. This training bridges the gap between theory and practice by walking you through real-world malware samples, live debugging, static and dynamic analysis techniques, and behavior monitoring. Whether you’re pursuing a career in digital forensics, incident response, or threat intelligence, this course provides the core foundation and investigative techniques required to detect, dissect, and defend against malicious software in today’s evolving threat landscape.

Who is this Training For?

This training is ideal for cybersecurity professionals, digital forensics analysts, SOC analysts, blue teamers, and anyone looking to strengthen their malware analysis capabilities. Whether you're a beginner aiming to break into the field or an experienced analyst seeking to refresh or enhance your skills, this course provides a structured and practical approach to understanding how malware works, and how to investigate it effectively.

System Requirements:

what you need to for the course

To ensure the best experience, participants should have access to a system capable of running virtualization software (e.g., VMware Workstation or VirtualBox) with at least 8 GB of RAM and 40 GB of free disk space.

We highly recommend using our hosted virtual lab environment, which will be provided as part of the course. This eliminates the need to set up local VMs and ensures you can follow along with all hands-on activities in a safe and controlled setting.

Refund Policy:

Refund requests for In-person and Online Virtual Training are accepted before the refund deadline and as long as the online course has not been accessed. To initiate a refund, please submit your request to [email protected]. The registration fee will be refunded, minus a $50 refund processing fee, to the original payment method. Please be advised that CYBER 5W OnDemand Courses are non-refundable and non-transferable once payment has been completed and course material has been accessed.