0% found this document useful (0 votes)
47 views1 page

Ost2 LP Ma

The document outlines learning paths for malware analysis training. It includes paths for reverse engineering different file formats like PE, ELF, Mach-O, and TE executables, as well as dynamic analysis of Windows, Linux, macOS, Android, and iOS systems. It also includes paths for static analysis, debuggers, threat intelligence, and analyzing malicious documents like PDFs and RTFs.

Uploaded by

shravan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views1 page

Ost2 LP Ma

The document outlines learning paths for malware analysis training. It includes paths for reverse engineering different file formats like PE, ELF, Mach-O, and TE executables, as well as dynamic analysis of Windows, Linux, macOS, Android, and iOS systems. It also includes paths for static analysis, debuggers, threat intelligence, and analyzing malicious documents like PDFs and RTFs.

Uploaded by

shravan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

OpenSecurityTraining2 Learning Paths:

Malware Analysis
Developed In Development / Reserved Future / Instructors Wanted

Malware Analysis 3104:


Reverse Engineering 1104:
Multi-format Malicious
Mach-O Executables
Documents

Reverse Engineering 1103: Malware Analysis 3103:


ELF Executables Rich Text Format (RTF)

Malware Analysis 3102:


Reverse Engineering 1102:
Portable Document Format
TE Executables
(PDF)

Reverse Engineering 1001: Debuggers 1001: Reverse Engineering 1101: Reverse Engineering 3201: Malware Analysis 3101: Malware Analysis 3001: Debuggers 3301:
Windows Dynamic Analysis Visual Studio PE Executables Symbolic Analysis MS Office OpenXML / OLE2 Threat Intelligence HyperDbg

Malware Analysis 1001: Debuggers 1012: Architecture 1001: Reverse Engineering 2001: Reverse Engineering 3001: Reverse Engineering 4011: Malware Analysis 4012:
Reverse Engineering 1011: Reverse Engineering 1012: Malware Analysis 1002:
Taxonomy & Techniques Introductory GDB x86-64 Assembly Introductory Static Analysis Intermediate Static Analysis Windows Windows Malware
Linux Dynamic Analysis Android Dynamic Analysis Reports
Overview

Reverse Engineering 1021: Debuggers 1011: Debuggers 2011: Reverse Engineering 3011: Reverse Engineering 4021: Malware Analysis 4022:
macOS Dynamic Analysis Introductory WinDbg Intermediate WinDbg Reversing C++ Binaries Linux Linux Malware
Reverse Engineering 1022:
iOS Dynamic Analysis
Debuggers 1101: Reverse Engineering 2101: Reverse Engineering 3012: Reverse Engineering 4031: Malware Analysis 4032:
Introductory IDA Intermediate IDA UEFI Static Analysis Android Android Malware

Debuggers 1102: Reverse Engineering 2102: Reverse Engineering 3013: Reverse Engineering 4041: Malware Analysis 4042:
Introductory Ghidra Intermediate Ghidra Go Static Analysis macOS macOS Malware

Reverse Engineering 3014: Reverse Engineering 4051: Malware Analysis 4052:

Dynamic Analysis Static Analysis Rust Static Analysis iOS iOS Malware

Reverse Engineering 4061:


UEFI

You might also like