I named that system HEXORCISM, based on exercises written to teach different problems and solutions.
For example, I wrote my own packers to explain IAT Redirection, Nanomites, VM obfuscations and the like. And of course, how to take care of them. All those exercises make the learning process a lot more fun and actionable.
Of course, if you want to create your system of reverse engineering, go for it!
You can - as I did - spend the next 15 years of your life to reverse engineer random samples, most of the time without any interest and learning value
You can watch the training videos calmly and do the exercises I created, with EVERYTHING, you need to know to reverse-engineer malicious applications quickly and efficiently.
You don't need to waste years struggling in your disassembler to become a reverse engineering expert.
From now on, you can watch my courses and discover the techniques i learned and created revealed in the training program.
No useless theoretical power points. This training is a goldmine of practical techniques.
It provides you all the keys to fast and efficient malware analysis and reverse engineering. (and you know those THOROUGH investigations )
The biggest mistake people make is jumping immediately into malware reversing. You first need to build foundations and methodology before you dive into malware analysis.
Best of all? You can start using those techniques TODAY.
The first part of the method focuses on learning techniques that you will later apply in malware analysis.
The lessons are dripped on a weekly basis so students don't get overwhelmed by information.
On top of this, you get live online weekly or monthly lessons for question and answers which will be recorded and available in the training materials.