Malware analysis & offensive engineering from a Microsoft and CrowdStrike alum

Hands-on malware analysis and offensive engineering—without fluff.

15+ years leading investigations and tooling. Learn through labs, code, and workflows you can apply on day one.

What you’ll practice
  • Structured malware reversing labs with reproducible setups
  • Offensive engineering patterns for tooling and payload development
  • Detection notes, queries, and checklists to reuse with your team
Experience
15+ years (Microsoft, CrowdStrike)
Microsoft, CrowdStrike
Audience
200+
4.9 ★ course rating
YouTube
3.4K
42 technical walkthroughs

Featured courses

Built from real incident response and research. Labs, code, and documentation you can reuse at work.

The Art of Malware Analysis
Beginner to Intermediate Malware Analysis

The Art of Malware Analysis

Learn reverse engineering, build a primary skill or add an additional skill giving you an edge.

11 hours 60 lessons
Offensive Development and Tradecraft
Intermediate to Advanced Offensive Development

Offensive Development and Tradecraft

For practitioners who want to build implants, loaders, and evasion tooling that survive modern detection engineering.

11 hours 112 lessons

How you’ll learn

Short videos, real code, and lab workflows that mirror production work.

Lab-first delivery

Each module includes a reproducible lab: VM setup, tooling, and a walkthrough that matches the demo.

Repeatable workflows

From reversing pipelines to build scripts, you get the exact steps and artifacts to reuse at work.

Reusable artifacts

Detection notes, hunt queries, and code repos stay updated as techniques change—no stale theory.

Ahmed Kasmani

Ahmed Kasmani

Research Lead (Fortune 500), ex-Microsoft & CrowdStrike

Research Lead focused on malware reverse engineering and security research. Previously at Microsoft and CrowdStrike across Security Research, Security Engineering, and MDR. 15+ years in cyber, with front-line work on incidents like WannaCry, NotPetya, SolarWinds, and ProxyShell. Committed to making hands-on security training accessible and affordable.

15+ years across Fortune 500 security research roles Former Security Research/Engineering at Microsoft and CrowdStrike Led and supported responses to major incidents (WannaCry, NotPetya, SolarWinds, ProxyShell)

Watch on YouTube

Technical walkthroughs and breakdowns—open on YouTube without heavy embeds.

What students say

Hear from practitioners who used the material on the job.

Get the labs

Browse the courses and deliver stronger security outcomes.

Malware analysis and offensive development, with labs, code, and repeatable workflows.