Bootcamp Format

The bootcamp consists of 16 hours delivered over 4 sessions (4 hours per session). This schedule is designed to give students ample time to absorb the content and complete the hands-on labs at a comfortable pace.

  • 4 Live Sessions

  • 4 Hours Per Session

  • 45+ Hands-On Lab Exercises

  • 20 Credit Hours of Virtual Lab Access

  • 1 CCMA Certification Exam Attempt

  • Access to Session Recordings

Upcoming Live Bootcamps

🎉 This is our new training format, running over 4 weeks and offering live, instructor-led sessions combined with hands-on labs, allowing you to learn real-world digital forensics at your own pace and on your own schedule.

  • Groups for group discounts, registration, or other schedules, please contact us at [email protected].
  • Bootcamp Syllabus

    The bootcamp is split into four modules across four sessions. For a detailed syllabus of what CCMA includes, please check the CCMA course webpage.

    Introduction to Malware Analysis

    • Malware Types, Distribution Methods, and Common Threat Vectors
    • Role of Malware Analysis in Cybersecurity Operations
    • Fundamentals of Malware Identification
    • Overview of Analysis Techniques: Static vs. Dynamic
    • Preparing a Safe Analysis Environment

    Static Malware Analysis 101

    • Binary Structure Fundamentals
    • Identifying Malware Signatures and Embedded Artifacts
    • Working with Basic Static Tools (Strings, PEview, Detect It Easy, etc.)
    • Extracting Metadata and Code Characteristics
    • Hands-on Static Analysis Exercises

    Dynamic Malware Analysis 101

    • Setting Up Isolated, Controlled Execution Environments
    • Monitoring Malware Behavior in Real-Time
    • System Interaction Analysis (Processes, Files, Registry)
    • Network Traffic Monitoring and Behavioral Indicators
    • Capturing and Interpreting Execution Artifacts

    Static Malware Analysis 102 – IDA Pro

    • IDA Pro Interface and Workflow
    • Disassembly Navigation and Code Exploration
    • Function Analysis and Cross-Reference Mapping
    • Understanding Flow Charts and Decompiled Code
    • Identifying Malware Capabilities via Disassembly

    Static Malware Analysis 102 – Ghidra

    • Ghidra Project Setup and Navigation
    • Disassembly & Decompiled View Analysis
    • Reverse Engineering Techniques Using Ghidra
    • Analyzing Code Structures and Control Flows
    • Comparing Ghidra vs. IDA Pro Approaches

    Dynamic Malware Analysis 102

    • Advanced Debugging Concepts
    • Walking Through Code Using Debuggers
    • Identifying Runtime Behavior and Logic Flow
    • Malware Evasion and Anti-Debugging Techniques
    • Unpacking Obfuscated or Packed Malware

    Analyzing Managed Code (Readable / Uncompiled)

    • Understanding .NET, Java, and Python Malware Structures
    • Using Decompilers for High-Level Code Analysis
    • Identifying Behavioral Intent in Readable Source
    • Reverse Engineering and Artifacts Extraction
    • Working with Managed Execution Environments

    Extracting IOCs and Writing YARA Rules

    • IOC Fundamentals and Threat Detection Use Cases
    • Extracting Indicators from Static and Dynamic Analysis
    • Understanding YARA Structure and Rule Components
    • Writing Effective and Accurate YARA Rules
    • Testing and Validating YARA Rules Against Samples

    More Than 10 Extra Hands-on Labs

    • Real-World Malware Samples and Case Scenarios
    • Process Injection Techniques (e.g., DLL Injection, Process Hollowing)
    • Analyzing Network-Based Malware Behavior
    • Reverse Engineering Obfuscated Code
    • Hybrid Static + Dynamic Analysis Workflows

    Note: Additional topics may be included depending on class progression and time allocation.

    Learning Objectives

    After completing this course, you are expected to:

    • Define and recognize various types of malware

    • Analyze and interpret the behavior of malware specimens in controlled environments

    • Identify common evasion techniques employed by malware

    • Identify key indicators of compromise through static analysis

    • Gain proficiency in executing malware in a controlled environment for behavioral analysis

    • Apply theoretical knowledge through hands-on exercises using real-world malware samples

    • Learn to create and utilize signatures for the detection of known malware patterns

    • Develop strategies for proactive malware detection

    • Learn mitigation strategies to contain and eradicate malware infections

    • Develop practical skills in using malware analysis tools and platforms

    What You’ll Get

    Buying this bootcamp will grant you all of the following:

    • Access to a private student lab environment

    • Live instruction from active malware analysts and reverse-engineering practitioners

    • Scenario-based malware investigations.

    • A CCMA exam attempt

    • Support from instructors during and after the course

    Prerequisites

    This course assumes no previous knowledge in malware analysis. However, basic knowledge in computer science, operating systems, programming, assembly, or any related field is highly desirable.

    Important: Learners must have experience installing software and running virtual machines within a hypervisor. Please ensure you are comfortable setting up and managing virtual machines independently.

    The Value of the Training

    Unlock the skills needed to identify, investigate, and understand digital incidents in a hands-on, guided environment. This training bridges the gap between theory and practice by walking you through real-world case scenarios, forensic imaging, artifact analysis, timeline reconstruction, and report writing.

    Whether you're pursuing a career in digital forensics, incident response, or security operations, this course provides the core foundation and investigative techniques required to uncover evidence, trace attacker activity, and respond effectively in today's evolving threat landscape.

    Who is this Certificate For?

    This training is ideal for cybersecurity professionals, digital forensics analysts, SOC analysts, blue teamers, and anyone looking to build or strengthen their digital investigation skills.

    Whether you're just entering the DFIR field or you're an experienced analyst looking to refine your techniques, this course offers a structured, hands-on approach to evidence acquisition, artifact analysis, and incident response, preparing you to investigate and respond to real-world security incidents with confidence.

    System Requirements

    What you need for the course

    To ensure an optimal learning experience, you will have access to our hosted virtual lab environment with 24 credit hours of lab access. Learners can purchase more credit hours if they need. This eliminates the need to configure local virtual machines and allows you to seamlessly follow along with all hands-on exercises in a secure, controlled environment.

    Refund Policy

    Refund requests for In-person and Online Virtual Training are accepted before the refund deadline and as long as the online course has not been accessed. To initiate a refund, please submit your request to [email protected]. The registration fee will be refunded, minus a $50 refund processing fee, to the original payment method. Please be advised that CYBER 5W OnDemand Courses are non-refundable and non-transferable once payment has been completed and course material has been accessed.

    Frequently asked questions

    • How do I purchase a course?

      You can enroll in any course directly through our platform using secure online payment via Stripe.

    • How do I access my course after enrollment?

      Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.

    • How long will I have access to the course material?

      Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.

    • What are the general technical requirements?

      Our platform is accessible from any device with internet access. For hands-on labs, we recommend:

      • A modern operating system capable of running virtual machines
      • 8 GB RAM (minimum)
      • 500 GB disk space
      • Hypervisor software: Virtualbox, VMWare, HyperV, etc


      Alternatively, we offer fully hosted Virtual Labs that allow you to complete technical exercises via the cloud. Please check our labs at: labs.cyber5w.com.


    • Can I ask for help if I don't understand something?

      Of course! Reach out by email anytime.

    • What is the expected time commitment for each course?

      Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.

    • Do you offer student discounts?

      Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.

    • Do you offer law enforcement and military professionals discounts?

      Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.

    • Do you offer corporate training or customized training solutions?

      Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.

    • Do your courses include Certificate of Completion?

      All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.

    Still have questions?

    Can't find the answer you're looking for? Please chat to our friendly team.

    Get in touch

    Stay ahead in DFIR!

    Sign up for the latest findings, field advancements, and updates on upcoming webinars, conferences, seminars, and free courses.

    Get updates!

    Thank You