Malware Analyst Path
Become an expert in malware analysis:
From Malware Analyst to Reverse Engineer

 

Begin your journey to discover malware and learn how to study and analyze it with our certified courses, designed to guide you toward excellence.

  • University
    professors
  • 24/7 access to the course
  • Tests and assessment exercises 
  • Downloadable material
  • Final examination and certification

A Flexible and Comprehensive Training Program

Start with the basics and achieve excellence with our modular and flexible approach, designed to adapt to your needs and pace.

Malware Analyst Path

  • Image
    Dynamic Course
    Malware Analyst
  • Image
    Professional Course
    Reverse Engineer

Our Malware Analyst Path is designed to offer a tailored learning experience. Thanks to the modular structure of our courses, you can start with the Dynamic Malware Analyst Course to build a solid foundation, and continue with the Professional Reverse Engineer Course to acquire advanced skills.

Why participate in our malware analysis courses?

From Zero to Expert quickly and easily


Start with the Dynamic Malware Analyst course to learn how to analyze malware dynamically, and progress to the Reverse Engineer course, where you will learn the secrets of Assembly and discover how to identify malware behavior.

Realistic Simulation Laboratories


You will have access to sophisticated simulation labs designed to replicate complex cybersecurity scenarios. This controlled environment is ideal for experimenting and honing your skills without the risks of the real world.

Acquiring the skills to identify abnormal software behavior

You will learn the methods used by malware to execute malicious system calls, a critical skill for preventing and mitigating threats. This skill is essential for maintaining the integrity and security of your IT infrastructure.

You will receive constant support from the teacher

Our instructor Andrea Tassotti will guide you through the platform and answer all your questions

Unlimited Access to Content and Resources

Study without time constraints with content accessible online 24/7, allowing you to organize your studies around your other commitments. You will have all the material you need to prepare for the final exam, ensuring flexible training at your own pace.

You will obtain prestigious certifications

This path will lead you to obtain the Certified Dynamic Malware Analyst and Certified Professional Reverse Engineer certifications, which are internationally recognized and will increase your career opportunities.
Image
Image
Tutte le certificazioni erogate da Fata Informatica hanno riconoscimento internazionale.
Fata Informatica dal 2022 è stata iscritta al registo dell'International Personnel Certification Association, organismo internazionale nato per assicurare la qualità delle certificazioni emesse dai propri membri garantendone il muto riconoscimento internazionale.
Le nostre certificazioni sono riconosciute anche dal Centro Italiano di Strategia e Intelligence.

You will have access to ...

Unlimited online access to content

You can study and access the online course at any time without interfering with your other commitments. You will have all the material you need to prepare for the final exam.

Workshops and exercises

In addition to the theory, practice is key. Online workshops accessible at any time will allow you to gain experience and familiarity with the technologies and tools used in this field.

Up-to-date and exclusive resources

Everything you need to know to start working in the security sector right away. Up-to-date content, methodologies, and operating procedures. Essential for achieving your goals right from the first interviews.

Support and interaction forum

Learn the methods used by professionals and
compare yourself with people who share
the same goal.
A communication channel for
interacting with teachers at any time.

Certifications in Malware Analysis

At the end of each course, you will receive
Cybersecurity certifications that are valuable in the job market and in job interviews.

Teaching approach

Il corso integra teoria e pratica, offrendo esperienza pratica con strumenti di sicurezza informatica e casi studio reali. Gli studenti imparano a rilevare, analizzare e mitigare le minacce informatiche, comprendendo appieno la portata e il potenziale impatto sulle organizzazioni.

The Teachers

Image

Antonio Capobianco, CEO of Fata Informatica, parent company of the CybersecurityUP brand and leader for over 30 years in the field of IT security.
He has an extensive background in academia, spanning Italy’s most elite institutions and currently lectures in Ethical Hacking and Malware Analysis at e-Campus University.
He is the author of the podcast ‘Cybersecurity & Cybercrime’.

The Company

Image
We were founded in 1994 with the aim of providing IT security services to Italian companies and public administrations.
We are the only Italian company to have been included by Gartner in its ‘Marketing Guide for IT monitoring tools’ thanks to our Sentinet3 product, developed in 2004 and now recognised as the leader in the Italian market.
We have created a business unit specialising in cybersecurity services, called CybersecurityUP, with the aim of providing vertical cybersecurity services to our customers, primarily the defence sector and companies of national strategic interest.

Course details

Dynamic Malware
Analyst Course (CDMA)

Course objectives


This course aims to train Malware Analysts capable of performing both static and dynamic analysis without the need to know assembler or use disassemblers or debuggers. During the course, participants will learn about the types of malware, the architecture of Windows systems and processes, the main primitives used for specific malware actions, and the probes to use to identify their behavior.



Course Programme
Introduction to Cybersecurity
Programme Details
  1. Cybersecurity
    1. Introduction
    2. The kill chain
    3. Analysis of an attack
Malware
Programme Details
  1. Introduction to Malware
    1. The PE Format
    2. DLLs
  2. Kernel Vs User Mode
    1. APIs
  3. Malware Characteristics
    1. Signatures
    2. Obfuscation and Mutation
    3. Polymorphic Malware
    4. Metamorphic Malware
    5. Mutation Engines
    6. Persistence
    7. DLL Hijacking
    8. Trojanized System Binaries
  4. Types of Malware
    1. Viruses
    2. Backdoors
    3. Adware
    4. Spyware
    5. Keyloggers
    6. Trojans
    7. RATs
    8. Cryptojacking
  5. Rootkits
  6. Ransomware & Co
  7. The Malware Market
Windows OS
Programme Details
  1. The Windows System

    1. Processes
    2. Virtual Address Space
    3. Threads
    4. Process Loading Stages
    5. Context Switching
    6. WOW64
    7. Main Windows Processes
      1. System Idle Process
      2. Registry
      3. Interrupts
      4. smss.exe
      5. Memory Compression
      6. svchost.exe
      7. csrss.exe
      8. wininit.exe
      9. winlogon
      10. lsass.exe
      11. services
      12. explorer
  2. Windows Primitives

    1. Process Manipulation
    2. File Manipulation
    3. Registry Manipulation
    4. Sockets
    5. DLL Loading
PE format
Programme Details
  1. RVA, VA and ImageBase
  2. The Headers
    1. DOS Header
    2. NT Header
    3. Optional Header
    4. Section Header
  3. The Sections
    1. .text
    2. .rdata
    3. .data
    4. .edata
    5. .rsrc
Static and Dynamic Analysis
Programme Details
  1. Static Analysis
    1. Antivirus Scanners
    2. Hashing
    3. Strings
    4. Packed Malware
    5. DLLs and Functions

  2. Dynamic Analysis
    1. Sandboxes
    2. Malware Execution
    3. Process Monitoring
    4. Registry Monitoring
    5. Network Simulation
    6. Packet Sniffing
Malware Behaviour
Programme Details
  1. Persistence Techniques
    1. Registry Keys
    2. File System
    3. Processes
    4. Services
  2. Injection Techniques
    1. DLL/Code Injection
    2. Image File Execution Options
    3. DLL Search Order Hijacking
    4. Process Injection
    5. Process Hollowing
    6. APC Injection
    7. Extra Window Memory Injection
  3. Hooking Techniques
    1. API Hooking
    2. IAT Hooking

Final certification
Image

Professional Reverse Engineer Course (CPRE)

Course objectives


Reverse engineering allows you to analyze and understand the inner workings of software. In the field of cybersecurity, it is crucial for studying malicious code and developing effective defenses. Large organizations concerned about the security of their data form specialized teams or hire experts to examine threats. This course teaches how to use reverse engineering techniques and tools to understand the behavior of code, through both static and dynamic analysis. Hands-on labs will help participants become proficient and autonomous in performing these analyses.

Course Programme
Module 1: Assembly language
Programme Details
  1. Assembly code 
  2. Instructions
  3. Functions and Stack 
  4. Architecture X64 
Module 2: Recognizing structures and loops in Assembly
Programme Details
  1. Loops and instructions 
  2. Array and Struct 
  3. Debugger 
  4. Hot Patching 
Module 3: Reversing Windows programs
Programme Details
  1. Registry Keys
  2. Manipulating Windows Registries
  3. Following an Algorithm with IDA
  4. Following an Algorithm with OllyDBG
  5. File Operations
  6. Process Operations
  7. Socket Operations
  8. Service Operations
Module 4: Obfuscation techniques
Programme Details
  1. Standard Obfuscation Algorithms
  2. Custom Obfuscation Algorithms
  3. Encryption Algorithms
Module 5: Antireversing techniques
Programme Details
  1. Antidisassembly techniques
  2. Antidebugger techniques
Module 6: Manual Unpacking 
Programme Details
  1. Packers
  2. Finfing the Original Entry Point
  3. Tail Jump
  4. ESP trick
  5. SEH Handling

Final certification
Image
Would you like to learn more about our courses and find out if there are any current promotions?

Fill in the form and one of our experts will get back to you as soon as possible.

Cyber Security UP

CybersecurityUP is a BU of Fata Informatica.
Since 1994, we have been providing IT security services to large civil and military organizations.
  • Ethical Hacking
  • Red Teaming
  • Penetration Testing
  • Security Code Review
  • SOC 24x7
  • Specialized Training
Image
Image
Image
Via Tiburtina 912,
CAP 00156,
ROMA

Monday-Friday
09:00 - 13:00
14:00 - 18:00

+39 06 4080 0490
amministrazione@fatainformatica.com

Contact us

Do you need our cybersecurity services?

Privacy policy

We invite you to read our
privacy policy for the protection of your personal data.
Disclaimer
Some of the photos on Cybersecurityup.it may have been taken from the Internet and therefore considered to be in the public domain. If the subjects or authors have any objections to their publication, they can report this by email to the editorial staff, who will promptly remove the images used.
© 2026 Fata Informatica. All rights reserved.
Pre-register now for the Ethical Hacker course! More info