intermediateWindows Malware14h · 2 labs

Windows Malware Intermediate

Advanced Windows malware analysis: defeat anti-analysis and evasion techniques, unpack protected binaries with x64dbg, analyze process injection and hollowing, extract C2 configurations, and deliver professional DFIR reports with MITRE ATT&CK mapping.

Lifetime access · HTK certificate included · 14-day refund guarantee

HTKWhat's included
  • 2 hands-on labs with isolated VM
  • 14h of content + per-module exams
  • Professional tools pre-configured
  • Lifetime access to all materials
  • HTK certificate upon completion
  • Private Discord community channel
159199

One-time payment, no subscription

Join Waitlist →

2

Hands-on labs

Isolated VM environment

14h

Of content

Videos + practice + exams

5

Modules

Progressive difficulty

4h

Per lab session

Unlimited restarts

Lab tools you will use

FLARE-VMx64dbgPE-StudioProcmonProcess ExplorerCAPAYARAFakeNet-NGWiresharkAutorunsDIEFLOSSScyllaPE-sieveCyberChefSigmaFLARE-VMx64dbgPE-StudioProcmonProcess ExplorerCAPAYARAFakeNet-NGWiresharkAutorunsDIEFLOSSScyllaPE-sieveCyberChefSigmaFLARE-VMx64dbgPE-StudioProcmonProcess ExplorerCAPAYARAFakeNet-NGWiresharkAutorunsDIEFLOSSScyllaPE-sieveCyberChefSigmaFLARE-VMx64dbgPE-StudioProcmonProcess ExplorerCAPAYARAFakeNet-NGWiresharkAutorunsDIEFLOSSScyllaPE-sieveCyberChefSigma

Course Syllabus

5 modules · 14h of content

What you will learn

  • Bypass anti-debugging, anti-VM, and sandbox evasion techniques
  • Manually unpack protected binaries and reconstruct import tables
  • Detect and confirm process injection and hollowing with forensic evidence
  • Extract C2 configuration data and decode obfuscated payloads
  • Produce professional DFIR reports with YARA/Sigma rules and hunting queries

Hands-on Lab

Tackle advanced malware samples that employ anti-debugging, anti-VM/sandbox evasion, packing, process injection, and hollowing techniques. Use x64dbg with ScyllaHide to bypass anti-analysis, manually unpack protected binaries and reconstruct IATs with Scylla, detect code injection with PE-sieve and HollowsHunter, analyze realistic C2 traffic in Wireshark, extract configuration blobs with CyberChef, and produce a complete DFIR report with MITRE ATT&CK mapping, IOCs, and YARA/Sigma detection rules.

2Labs included
4hSession window
UnlimitedRestarts
AutoFlag validation

Requirements

  • ·Modern web browser
  • ·Stable internet connection
  • ·No local installation required
  • ·Basic technical English recommended

Frequently Asked Questions

Everything you need to know before getting started

Start from the beginning?

Windows Malware Beginner

Not ready for intermediate yet? Windows Malware Beginner covers the foundational skills and guided labs you need before tackling the advanced material.

View beginner course →

Start from

159

or 199 € for the complete path

Ready to build real skills?

Get hands-on with real windows malware scenarios, professional-grade tools, and validated flag objectives. No prior experience needed.

One-time paymentLifetime access14-day money-back