Skip to content

Weekend Bootcamps

Malware Triage for Analysts

Cover treatment for Malware Triage for Analysts

Static-first triage, safe dynamic observation, and storytelling that helps seniors trust your calls.

Duration: 3 weeks · 36 hours (bootcamp)
Format: Bootcamp · Fri–Sun blocks
Reference tuition: ₩540,000 (KRW) — confirm in enrollment docs.
Starts: 2026-08-02

Request information

Scope

Hands-on with curated benign-adjacent samples in isolated environments. You focus on observation discipline: what you measured, what you did not, and when to escalate.

Features inside this cohort

  • Hash lineage notebooks mentors annotate publicly
  • Safe dynamic observation windows with kill-switch drills
  • YARA-adjacent hunting prompts without claiming vendor magic
  • Write-ups scored on clarity, not bravado
  • Cross-review swaps between cohort members mid-course
  • Resource packs for continued practice post cohort
  • Weekend bootcamp cadence with condensed morning labs

Artifacts you can show

  • Complete three triage write-ups that cite observable artifacts only
  • Explain escalation thresholds aloud in under two minutes
  • Maintain a personal artifact taxonomy reviewers can follow

Participant voices

Malware Triage for Analysts pushed me to silence speculation paragraphs—hard habit to break. Swap reviews felt exposing but sharpened the Malware Triage capstone draft.
Yuki · SOC trainee · 4/5 · Trustpilot
We appreciated the kill-switch emphasis; translated one checklist to our OT-adjacent monitoring crew.
Client in manufacturing

Policy-aligned answers

Are samples live malware?

No—they are instructor-controlled replicas with bounded behaviors; environments reset nightly.

Hardware requirements?

16GB RAM recommended for local VMs; cloud shells available as fallback.

Limitations?

Attribution or threat-intel geopolitical analysis is explicitly excluded.