Weekend Bootcamps
Malware Triage for Analysts
Static-first triage, safe dynamic observation, and storytelling that helps seniors trust your calls.
Duration: 3 weeks · 36 hours (bootcamp)
Format: Bootcamp · Fri–Sun blocks
Reference tuition: ₩540,000
(KRW) — confirm in enrollment docs.
Starts: 2026-08-02
Scope
Hands-on with curated benign-adjacent samples in isolated environments. You focus on observation discipline: what you measured, what you did not, and when to escalate.
Features inside this cohort
- Hash lineage notebooks mentors annotate publicly
- Safe dynamic observation windows with kill-switch drills
- YARA-adjacent hunting prompts without claiming vendor magic
- Write-ups scored on clarity, not bravado
- Cross-review swaps between cohort members mid-course
- Resource packs for continued practice post cohort
- Weekend bootcamp cadence with condensed morning labs
Artifacts you can show
- Complete three triage write-ups that cite observable artifacts only
- Explain escalation thresholds aloud in under two minutes
- Maintain a personal artifact taxonomy reviewers can follow
Participant voices
Malware Triage for Analysts pushed me to silence speculation paragraphs—hard habit to break. Swap reviews felt exposing but sharpened the Malware Triage capstone draft.
We appreciated the kill-switch emphasis; translated one checklist to our OT-adjacent monitoring crew.
Policy-aligned answers
Are samples live malware?
No—they are instructor-controlled replicas with bounded behaviors; environments reset nightly.
Hardware requirements?
16GB RAM recommended for local VMs; cloud shells available as fallback.
Limitations?
Attribution or threat-intel geopolitical analysis is explicitly excluded.