Affordable Training Categories

Affordable Digital Forensics Training

For the purpose of this site, “affordable” is under $1,000

I will try to keep up with price changes, however, the prices listed here may not always be accurate.

Name & Direct LinkPlatform/InstructorPrice in US DollarsPrice FrequencyTopics
Digital Forensics: Foundations PathPluralsight - Various Instructors29Monthly (There are also $299 and $449 yearly options)Digital Forensics Analyst Role based on NIST NICE, Digital Media Acquisition, Enumerating Computer Systems, Threats, Attacks, Vulnerabilities, Investigating Encrypted Systems, Legal and Ethical Considerations
Setting up a Forensic WorkstationPluralsight - Robert McMillen29Monthly (There are also $299 and $449 yearly options)Virtual Machines, Checkpoints, Sandboxing, Gathering Forensic Data for Legal Inquiry, Installing Forensic Applications, FTK Imager, Autopsy, Backups and Redundancy
USB ForensicsPluralsight - Philip Polstra29Monthly (There are also $299 and $449 yearly options)USB Forensics, Writeblocking and Impersonation, Duplication
iOS Social Media ForensicseForensics Magazine - Kinga Kięczkowska249One Time (Can also get all courses for $890/year)iPhone Analysis, Facebook, Facebook Messenger, WhatsApp, Instagram, Python Scripting, SQL Queries,
Digital Forensic ImagingeForensics Magazine - David Tatum249One Time (Can also get all courses for $890/year)Forensic Imaging, Hashing, Extraction, Examining Unallocated and Slack Space, Imaging HDDs and SDDs, Creating RAID Images, Memory Images, SaaS-based Images, Imaging Virtua Hard Drives in a VM, Enterprise-Wide Triage Imaging
Android Mobile ForensicseForensics Magazine - Divya Lakshmanan249One Time (Can also get all courses for $890/year)Android Incident Response, Unrooted & Rooted Device Analysis, Static Android Malware Analysis, Dynamic Android Malware Analysis, SIM Card Analysis, Encrypted Devices
Drone ForensicseForensics Magazine - Alan Roder249One Time (Can also get all courses for $890/year)UAVs, UAS, UAV Components, UAV Related Criminal Activities, Initial Response, Preservation, Audits and Logs, Seizure
Digital Video ForensicseForensics Magazine - Raahat D Singh249One Time (Can also get all courses for $890/year)Digital Video Concepts, Technical Issues Related to Video Recordings, Categories of Digital Videos, Videos as Forensic Evidence, Admissibility of Video Evidence, Forensic Video Analysis
Recovering Virtual Machines From Lost VMFS PartitionseForensics Magazine - Washington Almeida79One Time (Can also get all courses for $890/year)Virtual Machines (VMs), RAW Images, dcfldd, losetup, vmsf-tools, How to Identify and Manage VMFS Partitions
Project AresCircadence90Per Month (There is also a $900/Annual Option)This is a hands-on gamified learning platform that covers several areas including Forensics, Linux, and Scripting.
An Introduction to Digital ForensicsSecurity Blue Team26.71One TimeChain of Custody, Types of Evidence, File Carving, Linux Command Line, Stenography, Cracking ZIP Files
Everyday Digital ForensicsCybrary49.50Per Month for all courses - There is also a $299 per year optionDigital Forensics Investigation, Investigation Process, Data Acquisition, Evidence Logs, File Systems, Mobile Forensics, Image Analysis
Autopsy Basics and Hands-OnBasis Technology - Brian Carrier495One TimeAutopsy Installation, Cases and Data Sources, UI Basics, Hash Lookup, Modules, Keyword Search, Correlation Engine, Android Analyzer, Timeline Interface, Image Gallery, Tagging, Commenting & Reporting
Introduction to FTK Imager - On DemandAccessData100One TimeFTK Imager Features and Processes, Creating a Forensic Image, Viewing Evidence, Triage Process
Introduction to Password Recovery Toolkit - On DemandAccessData100One TimeFeatures and Processes of Password Recovery Toolkit, Creating Dictionaries, Word List Creation
Introduction to Forensic Toolkit - On DemandAccessData500One TimeForensic Toolkit Administration and Setup, Interface, Filtering and Searching, Known File Filter, Exporting and Reporting
New Technology File System (NTFS) ForensicseForensics Magazine - Divya Lakshmanan229One Time (Can also get all courses for $890/year)Processing System Files, Processing User Files, Features of NTFS, Sleuth Kit, Alternate Data Streams
Fourth Extended File System (EXT4) ForensicseForensics Magazine - Divya Lakshmanan219One Time (Can also get all courses for $890/year)Understanding EXT4, Locating Files and Directories, Forensically Interpreting EXT4 File System Features, Encryption
MDFIR - Certified DFIR SpecialistMosse Cyber Security Institute450One TimeFile Analysis, Windows Forensics, Memory Forensics, Applications Forensics, Network Forensics, Malware Analysis, Enterprise Investigations, Threat Intelligence, Writing Digital Forensics and Incident Reports
Digital Forensics FundamentalsParaben Corporation Training Academy995One TimeEvidence Collection, Chain of Custody, Foundational Details of the Field of Digital Forensics. This course includes certification as a Certified Computer Examiner once the course and test are completed.
Linux ForensicsCodeRed24.99Per Month - There is also a $249/year option. Both options include access to all CodeRed courses.Linux History, Architecture, File System Overview, File Permissions, Editing File Properties, Root, Sudo, System Initialization, Emergency Alternative Start-Up Options, Shutting Down the System. Processes
INE - Digital ForensicsINE - Ali Hadi49Monthly (There is also a $499 and $749/year option)Digital Forensics, Logs, Timelines, Reporting, System & Network Forensics, Acquisition, File & Disk Analysis
Digital Forensics CoursesCyber 5W50One TimeEvidence Acquisition Under Windows and Linux, Working With FTK Imager, File Systems and Data Carving, Investigating Windows Program Executions, LNK and Jumplists, Windows Thumb Caches, Windows User & System Registry Artifacts, Windows Shellbags, USB Forensics, Volume Shadow Copies (VSC) and File History, Windows Event Logs, Encrypted Files
Linux Forensics, USB Forensics, & Windows ForensicsPentester Academy69MonthlyLinux, USB, Memory, Disk, and Windows Forensics

Affordable Incident Response Training

For the purpose of this site, “affordable” is under $1,000

I will try to keep up with price changes, however, the prices listed here may not always be accurate.

Name & Direct LinkPlatform/InstructorPrice in US DollarsPrice FrequencyTopics
Hands-On Incident Response FundamentalsPluralsight - Ryan Chapman29Monthly (There are also $299 and $449 yearly options)Defining Incident Response, Common Incident Response Tasks, Analyzing Files, Base64, Threat Intelligence, IOCs
Operationalizing Cyber Threat Intel: Pivoting & HuntingPluralsight - Ryan Chapman29Monthly (There are also $299 and $449 yearly options)Cyber Threat Intelligence (CTI), IOC Extraction, IOC Pivoting, IOC Hunting, Intel Management
Security Event Triage PathPluralsight - Various Instructors29Monthly (There are also $299 and $449 yearly options)Analyzing Network, Application, Machine & Endpoint Data, TTPS, KSAs, Tools, Detecting Malicious Traffic, Monitoring Assets and Topology, Detecting Anomalies, Statistical Baselining with SIEM Data
Streamlining Your Incident Response Process with SplunkPluralsight - Aaron Rosenmund and Ryan Chapman29Monthly (There are also $299 and $449 yearly options)Introduction to Splunk, Log Data, Aggregation, Splunk Resources, Using Splunk. Note: In addition to this one, there are a lot of Splunk courses on Pluralsight including certification paths.
Investigation TheoryApplied Network Defense - Chris Sanders647One TimeMental Models for Approaching an Investigation, Interpreting Evidence, Asking Investigative Questions, Open Source Intel, Strategies for Tracking the Investigation Process, Finding Leads Without Alerts, Recognizing Negative Bias, Reporting
ELK for Security AnalysisApplied Network Defense - Chris Sanders497One TimeElasticsearch, Logstash, Kibana, Beats, JSON, Collecting and Manipulating Structured and Unstructured Data, Searching Data, Building Dashboards, Building Data Pipelines, Logs, Netflow, IDS Alerts, CSV Files
Building Virtual LabsApplied Network Defense - Tony Robinson197One TimeThis is a choose your own adventure style course where you can chose to build a lab with Snort, Suricata, or Splunk. IDS/IPS, SIEM, Log Aggregation.
Practical Threat HuntingApplied Network Defense - Chris Sanders647One TimeHunting Frameworks, MITRE ATT&CK, Common Types of Anomalies, Effective Note Taking, ELK, Hands-On Threat Hunting Labs
Practical Packet AnalysisApplied Network Defense - Chris Sanders797One TimeHow Networking Works at the Packet Level, Interpreting Packet Data, Wireshark, Filters, Network Protocols, Application Layer Protocols, Packet Carving Techniques, How Malware Communicates on the Network
Osquery for Security AnalysisApplied Network Defense - Josh Brower397One TimeCrafting SQL Queries, Interrogating Processes to Determine if They're Malicious, Uncovering Persistence and Lateral Movement, MITRE ATT&CK, Kolide, ELK Stack, Generating Alerts
Intrusion Detection with SuricataApplied Network Defense - Open Information Security Foundation497One TimeInstalling and Configuring Suricata, Techniques for Capturing Network Data, Rules, EveBox, JQ, Alerts
Demystifying Regular ExpressionsApplied Network Defense - Darrel Rendell197One TimeHow to Apply Regex, Building and Testing Regular Expressions, Writing Host-Based Detection with YARA, Grep, Snort Rules, Matching Host Logs in SIEMs
Project AresCircadence90Per Month (There is also a $900/Annual Option)This is a Hands-On gamified learning platform with paths that include Cyber Defense Analyst. There are also battle rooms that include forensics, Linux, and scripting as well as games to learn about protocols, Regex, and the Cyber Kill Chain.
LetsDefendLetsDefend15Per MonthThis is a SOC Simulation Environment including alerts, case management, log search, endpoint security and threat intelligence. Save 15% off right now using code DFND15. Proceeds using that code go to the Innocent Lives Foundation.
Mastering Wireshark (Video)Packt9.99Per Month (For everything on Packt) There is also a one time $124.99 purchase option for this course.Network Forensics, Wireshark Customization, Capturing and Examining Traffic, Analyzing Network Protocols, Analyzing Application Protocols, Command Line Tools, Expanding & Troubleshooting Wireshark
An Introduction to Network AnalysisSecurity Blue Team26.71One TimeNetworking 101, Wireshark, TCPDump, PCAP Analysis
Introduction to Threat HuntingSecurity Blue Team26.71One TimeThreat Hunting Explained, IOCs, Hunting for Malware, Hashing, Mandiant Redline, File Properties
Blue Team Level 1 (Training and Certification)Security Blue Team601.07One Time (The price includes training and two BTL1 certification exam attempts)Security Fundamentals, Phishing Analysis, Threat Intelligence, Digital Forensics, Incident Response, SIEM
Hands-On Incident Response AnalysisPackt - Suni Gupta9.99Per Month (For everything on Packt) There is also a $124.99 one time purchase option for the course. Incident Response Strategy Formulation, Communication, Containment, Documentation, Forensics and Eradication. Detecting and Preventing Attacks, Handling Malicious Code, Insider Threats
Introduction to Malware Analysis for Incident RespondersPackt - Jason Dion9.99Per Month (For everything on Packt) There is also a $188.99 one time purchase option for the course. Symptoms and Activities, Types of Malware, Infection Vectors, Malware Analysis, FlareVM,
Incident Handler Career PathCybrary 49.50Per Month - There is also a $299 per year optionIncident Response Steps, Incident Response Planning, Implementing an Incident Response, Log Correlation & Analysis, Recovery, Chain of Custody, Documentation, Legal Concerns
SOC Analyst 1, 2, and 3 Career PathsCybrary49.50Per Month - There is also a $299 per year optionThreat Intelligence, Log Analysis, Wireshark, Cryptography, Attack Mitigation, Splunk, SIEM, Incident Response, Digital Forensics, Intrusion Detection, Reverse Engineering
The Complete Splunk Enterprise Certified Admin CourseUdemy - Adam Frisbee29.99One TimeSplunk Admin Basics, License Management, Configuration Files, Indexes, User Management, Authentication Management, Getting Data In, Distributed Search, Forwarders, Monitor Inputs, Network and Scripted Inputs, Agentless Inputs, Fine Tuning Inputs, Parsing Phase and Data, Manipulating Raw Data.
The Complete Splunk Beginner CourseUdemy - Adam Frisbee29.99One Time (Prices on udemy change but they have sales often)Setting up a Splunk environment, Creating Reports and Dashboards, Understanding SPL (Search Processing Language), Building datasets and data models.
MDFIR - Certified DFIR SpecialistMosse Cybersecurity Institute450One TimeFile Analysis, Windows Forensics, Memory Forensics, Applications Forensics, Network Forensics, Malware Analysis, Enterprise Investigations, Threat Intelligence, Writing Digital Forensics and Incident Reports
MBT - Certified Blue TeamerMosse Cyber Security Institute450One TimeDeploy and Manage Incident Mitigation Strategies and Tools, Investigate and Contain Security Intrusions on Windows Systems, Analyze Suspicious Binaries and Malware Samples, Identify Unknown Attacks, Produce Threat Intelligence, Write Custom Tools
MTH - Certified Threat HunterMosse Cyber Security Institute450One TimeCapturing Logs in Large-Scale Computer Networks, Using Python to Hunt for IOCs, Using YARA to Hunt for Malicious Binaries at Scale, Perform Deep-Dive Digital Forensics Investigations and Write Rapid Incident Response Reports
Blue Team Boot Camp: Defending Against HackersCodeRed24.99Per Month - There is also a $249 per year option. Both options include access to all courses on CodeRed.Risk Analysis, Threat Intelligence, Cyber Kill Chain, Endpoint Security, EDR, Windows Hardening, OSQuery, PowerShell, WMI, Linux Hardening, ClamAV, Chkrootkit, HIDS in Linux, MITRE ATT&CK, Network Security, Firewalls, VLAN, Proxy Servers, Log Aggregation & Correlation, Windows Logs, Linux Logs
SOC Analyst Prep WorkshopCover6 Solutions - Tyrone Wilson199One TimeThreat Management, Vulnerability Management, Cyber Incident Response, Security Architecture and Tool Sets. This is a live, virtual workshop. Dates vary.
CompTIA CySA+ TrainingDion Training399One TimeCySA+ Training, Practice Exams, and Hands-On Labs.
Cyber Defense PathTryHackMe10Per MonthSecurity Operations and Monitoring, Threat Emulation, Incident Response, Forensics, Malware Analysis and Reverse Engineering
CyberChef for Security AnalystsApplied Network Defense397One TimeCyberChef, Character Encoding and Encryption, Data Formatting and Parsing, Defeating Malware Obfuscation, Log File and Forensic Analysis Techniques, Image Manipulation, HTTP Requests, JSON Data
INE - Incident Handling & ResponseINE - Dimitrios Bougioukas49Monthly (There is also a $499 and $749/year option)Incident Handling & Response Overview, Network Traffic & Flow Analysis, Practical Incident Handling, SOC 3.0 Operations & Analytics

Cyber Security Incident Response Wannacry Ransomware

Udemy - Balazs Lendvay39.99One TimeInvestigate Wannacry behavior, Triage and identify IOCs, Static Analysis, Create a summary report of the incident

Affordable OSINT Training

For the purpose of this site, “affordable” is under $1,000.

I will try to keep up with price changes, however, the prices listed here may not always be accurate.

Name & Direct LinkPlatform/InstructorPrice in US DollarsPrice FrequencyTopics
Open Source Intelligence (OSINT) FundamentalsTCM Security - Heath Adams29.99One TimeOSINT Overview, Notekeeping, Sock Puppet Accounts, Search Engines, Email Addresses, Breached Data, Phone Number, Username, Website, Social Media, Wireless Network OSINT, Tools, Automation, Report Writing
Using the Internet as an Investigative Research ToolToddington499.99One TimeAdvanced Search Features, OSINT Principles and Processes, Avoiding Detection, Piecing User-Generated Content Together, Social Media, Maltego,
Social Media Intelligence & InvestigationToddington299.99One TimeSOCMINT, Search Techniques, Documentation Tools and Practices, Investigating Images, Sock Accounts, Facebook, Twitter, Instagram, YouTube, Online Forums, Groups, Blogs, Geolocation, Monitoring Users and Locations, Privacy Considerations and Techniques
Trace Labs OSINT Foundations CourseOSINT Combine - Chris Poulter99Every 6 MonthsAnalysis Techniques, Collection Sources, Collection Approach & Reporting Methods, Advanced Google Searching, People Search Engines, Username Correlation, Reverse Image Searching
OSINT Fundamentals + Social Media CourseOSINT Combine - Chris Poulter799Per YearAnalysis Techniques, OSINT Platform, Collection Approach & Reporting Methods, Advanced Google Searching, People Search Engines, Username Correlation, Reverse Image Searching, Person of Interest Collection on Various Social Media Platforms, Social Network Analysis
Plessas Training

They have training webinars as well as a monthly news and resources subscription.
Plessas49.99One TimeOSINT for Archives, Introduction to OSINT, OSINT News and Resources
OSINT Area & Event Awareness CourseOSINT Combine - Chris Poulter499Per YearSocial Media Monitoring, CCTV Monitoring, Advanced Mapping, Region Assessments, Threat Actors, Event Monitoring
OSINT Base CampThe Cyber Institute197One TimeOSINT Background and Process, OPSEC, Advanced Search Techniques, Username Investigation, Reverse Image Searching, Maps & Satellite Images, Email, Phone Numbers, Social Media, Tools
IntelTechniquesIntelTechniques500Per YearCase Notes, Video/Screen Capture & Preservation, Search Sites & Tools, Names, Email. Usernames, Phone Numbers, Social Media Investigations, Photos & Video, Documents, Maps, Vehicles, Corporations, Groups, Events, Domains, IPs, VMs, Darknet, Command Line & Scripts
Shodan, OSINT & IoT DeviceseForensics Magazine - Maciej Makowski39One Time (Can also get all courses for $890/year)Searching on Shodan, GUI & CLI, Identify Vulnerable IoT Devices, Search for ICS Devices, Hide Your Devices From Shodan Searches, VPN and Proxy Impact on Shodan
Introduction to Open-Source IntelligenceSecurity Blue Team26.71One TimeOSINT Framework, The Harvester, TweetDeck, Reverse Image Searching, Google Dorks
Introduction to Darkweb OperationsSecurity Blue Team26.71One TimeDark Web, Clear Web, Deep Web, Tor, Search Engines
OSINT Training Essentials (Online)ShadowDragon250Per Year (There are also other options.)OSINT Collection & Analysis, Manual & Automated Intelligence Collection Methods
Hetherington Group WebinarsHetherington Group69One Time (Prices ranged from $69 - $414)The Hetherington Group has Webinars with Topics Such as: Dark Web Investigations, Online Search Engines, Social Media, Public Records, Ethical Investigations
Introduction to People OSINT/Missing People OSINTThe OSINTion - Joe Gray175One TimeOSINT Fundamentals, People OSINT Tools and Resources, Social Media, EXIF, Reverse Image Search, Collaboration Strategies, Mini-CTF to Apply the Concepts
Alternative and Advanced Search Engine OSINTThe OSINTion - Joe Gray125One TimeGoogle Dorking/Advanced Operators, Other Search Engines, Techniques for Searching Abroad
OCR and Image/Video AnalysisThe OSINTion - Joe Gray125One TimeReverse Image Search, EXIF Analysis, Optical Character Recognition (OCR)
Business OSINTThe OSINTion - Joe Gray175One TimeOSINT Fundamentals, Legal and Ethical Considerations, DNS, Social Media, Public Filings, Search Engines, OSINT Tools
Practical OPSEC for OSINT and PrivacyThe OSINTion - Joe Gray150One TimeOSINT and OPSEC Relationship, Social Media and Internet Presence, Secure Technologies, Proactive use of Disinformation and Deception for OPSEC, Steps to Take to Enhance One's OPSEC
OSINT Udemy CoursesUdemy10.99One Time (Prices Vary)Udemy has several courses with topics such as: OSINT, Dark Web, Social Media Intelligence. Just search for "OSINT".
Open Source Intelligence (OSINT) FundamentalsCybrary49.50Per Month - There is also a $299 per year optionOSINT Theory, Notes, Sock Puppets, Tools and Techniques, OPSEC
Open Source Intelligence for ForensicseForensics Magazine - Joshua Richards249One Time (Can also get all courses for $890/year)Using Identifiers, Social Media Profiles, Public Records, Tools & Extensions
OSINT - Open Source IntelligenceCodeRed24.99Per Month - There is also a $249/year option. Both options include all courses on CodeRed.Note Taking, Google, Reverse Searches, Darkweb, People Search, Data Breaches, Maltego, Building an OSINT Machine, Social Media
OSINT Investigation TacticsCyberSec Guidance50One TimeOSINT Approaches, Note Keeping, OSINT Tools, Writing OSINT Investigation Reports, Real World OSINT Investigation Simulation
Dark Web SeminarBlackHorse500One TimeDigital Identity, Layers of the Internet, Tor, Onion Services, TAILS, Whonix, Creating a Personal Onion Service, Secure Dark Web Communications
MOIS - Certified OSINT ExpertMossé Cyber Security Institute450One TimeEnvironment Setup, Search Engines, Facebook, Twitter, LinkedIn, Instagram, Usernames, GitHub, Email Addresses, Online Communities, Documents, Online Maps, Images, Videos, Domain Names, IP Addresses, Tor, Data Breaches, Documentation, Reports & Procedures
McAfee Institute OSINT CoursesMcAfee Institute29.97One TimeSocial Media Investigation and Methodologies, Advanced Social Media Investigations, Investigations on the Deep Web, Learn How to Gather Effective Intelligence Online, Introduction to OSINT, Top 20 Intelligence Resources, Twitter Investigation Methodologies
Certified Social Media Intelligence Analyst (SMIA)McAfee Institute947One TimeLearn how to investigate and gather intelligence on the top social media platforms around the world

Affordable Malware Analysis & Reverse Engineering Training

For the purpose of this site, “affordable” is under $1,000.

I will try to keep up with price changes, however, the prices listed here may not always be accurate.

Name & Direct LinkPlatform/InstructorPrice in US DollarsPrice FrequencyTopics
Getting Started with Reverse EngineeringPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Assembly Basics, Native Code, Reverse Engineering, Debuggers
Analyzing Malware for .NET and Java BinariesPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options).NET Binaries, Java Binaries
Reverse Engineering Malware with GhidraPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Ghidra, Reverse Engineering, Malware, Obfuscation, Packing, Ghidra Scripts
Defeating Anti-Reverse Engineering and Anti-Debugging TechniquesPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Defeating Anti-Reverse Engineering Techniques, Stopping Anti-Debugging Techniques, Sandboxing
Malware Analysis: Identifying and Defeating Code ObfuscationPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Code Obfuscation, VBA Obfuscation, PowerShell Obfuscation, String Obfuscation, Cryptography in Malware
Malware Analysis: Identifying and Defeating PackingPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Common Packing Scenarios, How Packers Work, Identifying Custom Packers, Performing Manual Unpacking
Setting Up a Malware Analysis LabPluralsight - Aaron Rosenmund & Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Creating a Safe Environment, Choosing Operating Systems, Evading Intelligent Malware, Choosing Hardware to Use, Virtual Machines, Tools
Fileless MalwarePluralsight - Aaron Rosenmund and Tyler Hudak29Monthly (There are also $299 and $449 yearly options)How Fileless Malware Works, Defenses Against Fileless Malware, Logging, Hunting Tools
Performing Malware Analysis on Malicious DocumentsPluralsight - Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Lab Setup, Malicious Document Analysis, PDF Analysis, JavaScript Analysis, VBA Script Analysis
Malware Analysis FundamentalsPluralsight - Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Lab Setup, Static Analysis, Dynamic Analysis, Understanding the PE Header
TrickBot Banking TrojanPluralsight - Aaron Rosenmund and Tyler Hudak29Monthly (There are also $299 and $449 yearly options)What TrickBot Does, TrickBot Analysis in the Lab, Detecting TrickBot Indicators on Your Network
Zero 2 AutomatedZero2Automated200.07One TimeEncryption, Hashing, Compression, Unpacking, Maldocs, Loaders, Persistence, Process Injection, Uncompiled Malware, Exploits, Rootkits, Bootkits, Shellcode, Threat Intelligence, TrickBot, YARA Signature Development
A Crash Course in Deep Dive Malware Analysis (On-Demand)AGDC Services200One TimeAdvanced Malware Analysis, IOCs, Decision Making Process, How to Identify Key Focus Areas, Building a C2 Server for Dynamic Analysis, Ghidra, x64Dbg, REMNux
MRE - Certified Reverse EngineerMosse Cyber Security Institute450One TimeBinary Classification, Behavioral Analysis, Memory Forensics, Static Analysis, Dynamic Analysis, Basic Code Deobfuscation Techniques, Analyze Ransomware, RATs, and APTs.
INE - Malware AnalysisINE - Ali Hadi49Monthly (There is also a $499 and $749/year option)Malware Analysis, Static Analysis, Assembly, Behavior Analysis, Debugging, Disassembly, Obfuscation Techniques
INE - Reverse EngineeringINE - Kyriakos Economou49Monthly (There is also a $499 and $749/year option)Practical Reverse Engineering, Reverse Engineering Foundations