Affordable Malware Analysis & Reverse Engineering Training

For the purpose of this site, “affordable” is under $1,000.

I will try to keep up with price changes, however, the prices listed here may not always be accurate.

Name & Direct LinkPlatform/InstructorPrice in US DollarsPrice FrequencyTopics
Getting Started with Reverse EngineeringPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Assembly Basics, Native Code, Reverse Engineering, Debuggers
Analyzing Malware for .NET and Java BinariesPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options).NET Binaries, Java Binaries
Reverse Engineering Malware with GhidraPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Ghidra, Reverse Engineering, Malware, Obfuscation, Packing, Ghidra Scripts
Defeating Anti-Reverse Engineering and Anti-Debugging TechniquesPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Defeating Anti-Reverse Engineering Techniques, Stopping Anti-Debugging Techniques, Sandboxing
Malware Analysis: Identifying and Defeating Code ObfuscationPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Code Obfuscation, VBA Obfuscation, PowerShell Obfuscation, String Obfuscation, Cryptography in Malware
Malware Analysis: Identifying and Defeating PackingPluralsight - Josh Stroschein29Monthly (There are also $299 and $449 yearly options)Common Packing Scenarios, How Packers Work, Identifying Custom Packers, Performing Manual Unpacking
Setting Up a Malware Analysis LabPluralsight - Aaron Rosenmund & Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Creating a Safe Environment, Choosing Operating Systems, Evading Intelligent Malware, Choosing Hardware to Use, Virtual Machines, Tools
Fileless MalwarePluralsight - Aaron Rosenmund and Tyler Hudak29Monthly (There are also $299 and $449 yearly options)How Fileless Malware Works, Defenses Against Fileless Malware, Logging, Hunting Tools
Performing Malware Analysis on Malicious DocumentsPluralsight - Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Lab Setup, Malicious Document Analysis, PDF Analysis, JavaScript Analysis, VBA Script Analysis
Malware Analysis FundamentalsPluralsight - Tyler Hudak29Monthly (There are also $299 and $449 yearly options)Lab Setup, Static Analysis, Dynamic Analysis, Understanding the PE Header
TrickBot Banking TrojanPluralsight - Aaron Rosenmund and Tyler Hudak29Monthly (There are also $299 and $449 yearly options)What TrickBot Does, TrickBot Analysis in the Lab, Detecting TrickBot Indicators on Your Network
Zero 2 AutomatedZero2Automated200.07One TimeEncryption, Hashing, Compression, Unpacking, Maldocs, Loaders, Persistence, Process Injection, Uncompiled Malware, Exploits, Rootkits, Bootkits, Shellcode, Threat Intelligence, TrickBot, YARA Signature Development
A Crash Course in Deep Dive Malware Analysis (On-Demand)AGDC Services200One TimeAdvanced Malware Analysis, IOCs, Decision Making Process, How to Identify Key Focus Areas, Building a C2 Server for Dynamic Analysis, Ghidra, x64Dbg, REMNux
MRE - Certified Reverse EngineerMosse Cyber Security Institute450One TimeBinary Classification, Behavioral Analysis, Memory Forensics, Static Analysis, Dynamic Analysis, Basic Code Deobfuscation Techniques, Analyze Ransomware, RATs, and APTs.
INE - Malware AnalysisINE - Ali Hadi49Monthly (There is also a $499 and $749/year option)Malware Analysis, Static Analysis, Assembly, Behavior Analysis, Debugging, Disassembly, Obfuscation Techniques
INE - Reverse EngineeringINE - Kyriakos Economou49Monthly (There is also a $499 and $749/year option)Practical Reverse Engineering, Reverse Engineering Foundations
Malware Analysis & Digital InvestigationsCyberDefenders - Amr Thabet997One TimeInstalling and Copying Malware Samples to a VM, APT Attacks and Malware Analysis Overview, Incident Response Process, x86 Assembly, Windows Internals, Encryption and Encoding, Process Injection & Anti-Reversing Techniques, Banking Trojans and API Hooking, Exploits and Shellcode, Kernel-Mode Rootkits, Threat Intelligence & Machine Learning, Malware Analysis Report, Real Malware Analysis Scenarios