Advanced Crimeware Reverse Engineering: 2021


Major attacks are becoming as complex as targeted operations against governments. Learn how to crack them.

The 2 day course will take place online on the 14-15 September 2021.

In stock

SKU: 44CON-2021-TRN-ACRE Category: Tags: , , , ,

Live Online Training

Presented By: Sergey Lozhkin

The 2 day course will take place online on the 14 and 15 September 2021.

The price is £1,300 (inc VAT/£1083.33 ex VAT).

Add to basket




  • Core programming concepts.
  • Knowledge of Windows OS architecture and APIs.
  • Basic knowledge of Assembler language is a must.

Course Description

This training provides all you need to know for analysing sophisticated malware used in modern real attacks against financial organisations. We will learn how to reverse malicious code used by Lazarus, Carbanak and Silence, among others. We will analyse methods, malware, payload delivery vectors, shellcodes, anti-analysis and anti detection capabilities used in modern financial attacks.

The training is 99% hands on and provides students with the core knowledge to reverse engineer financial malware, regardless of their tool of choice. This training is designed for Reverse Engineers, Security Analysts and Operators, as well as Threat Intelligence analysts who want to have a better understanding on how modern attacks against financial organisations look like. Prior reverse engineering knowledge is required – this training is not aimed for beginners.

Key Takeaways

  • Reversing approach and first steps to analysing modern financial attacks.
  • Static and dynamic analysis of financial APT samples and artefacts.
  • Creating automatic deobfuscation tools.
  • Analysis of malicious documents: shellcode and payload extraction.

Who should attend

  • Reverse engineers
  • Security Analysts
  • Security Operators
  • Threat Intelligence Analysts

Add to basket

About the instructor

Sergey Lozhkin is a malware reverse engineer focusing on APTs. He researches various topics in cybersecurity, mostly related to investigating and reverse engineering advanced persistence and financial threat. For 7 years, Sergey was a senior security researcher at Kaspersky Global Research and Analysis Team where he researched and published on financial threats like Carbanak, Silence, and Digital Doppelgangers and analysed many nation-state APTs samples. Based on this experience, Sergey created malware reverse engineering courses that show the most effective methods for analysing top malware threats. He’s trained both beginner and experienced malware analysts, SOC analysts in various private and government organisations all over the world, as well as law enforcement officers.

Additional information


14-17 June 2021, 13-16 September 2021