Skip to main content

Advanced Malware Reversing: Join the FLARE Team for Virtual & In-Person Training

  • January 14, 2026
  • 0 replies
  • 18 views

jstroschein
Staff
Forum|alt.badge.img+3

🔥 Thrilled to announce two opportunities to join our comprehensive deep-dive training, developed by the FLARE Team at Google Cloud Security. 

This course moves beyond the basics, equipping you with the practical, hands-on tradecraft needed to dissect today's most sophisticated Windows malware. Whether you prefer the convenience of virtual learning or the intensity of an in-person event, we have a session for you!

What You Will Learn:

  • Time Travel Debugging (TTD) →  Leverage this powerful tool to trace and query execution for efficient behavioral analysis.
  • EDR Evasion Bypass → Defeat advanced anti-analysis tricks and uncover techniques like process injection and indirect syscalls used to bypass modern EDR systems.
  • Complex Binary Analysis → Reverse complex C++ and .NET (C#) malware with confidence 
  • Windows Internals → Gain low-level knowledge necessary to understand how advanced threats operate on the OS.

Virtual Training - RingZer0 CounterMeasure

👀 Course: The FLARE Guide to Windows Internals and Advanced Reversing
🗓️ Dates: March 22-26, 2026 (32 Hours, Virtual)
🎯 Register Here: https://ringzer0.training/countermeasure-spring-2026-the-flare-guide-to-windows-internals/

In-Person Training - Black Hat Asia 2026
👀 Course: The FLARE Team's Guide to Reverse Engineering Modern Malware
🇸🇬 Location: Marina Bay Sands, Singapore
🗓️ Dates: April 21-24, 2026 (4-Day, In-Person)
🎯 Register Here: https://blackhat.com/asia-26/training/schedule/index.html?track[]=malware#the-flare-teams-guide-to-reverse-engineering-modern-malware-49607

✅ Don't miss this opportunity to train with the team on the front lines of cyber defense!