Reverse engineering & forensics for incident response

Responder Pro

Behavior-based malware detection and analysis

Active Defense

Endpoint Detection & Response for the enterprise

Ponemon Nation State Attacks Report CTA
Blue Coat Joint Solution

CounterTack Training Courses

CounterTack offers Online, Instructor Led Training Courses to provide digital investigators and other incident responders with the most cutting-edge tools and skills needed to effectively and accurately detect and respond to today's targeted attacks. These courses include: Introduction to Malware Reverse Engeering, Active Defense, Basic Malware Analysis Using Using Responder® PRO, and Advanced Malware Analysis Using Responder PRO.

Training classes are now being offered both in the classroom and online.  Online virtual classes are 4 hours in length, over one day of instructor led classes to present instruction, labs and self-paced exercises.

For more information about your training options, please contact Training 

Introduction to Malware Reverse Engineering (Instructor-led, Virtual Course)

In this 4-hour, virtual course (ISC)2 members can earn 4 CPE credits while CounterTack will show you the basics of how to capture and analyze memory images and reverse engineer malware found in physical memory. This hands-on virtual class will teach repeatable techniques for acquiring and analyzing live Windows memory using the wide range of functionality of Responder® PRO with Digital DNA® has to offer. Learn more about this course by reading the datasheet.

Sign up for our next Introduction to Malware Reverse Engineering Training Course

Advanced Malware Analysis Using Responder® PRO (Instructor-led Course)

This hands-on course provides a challenging and deep level of understanding through using Responder PRO to discover methods used by malware authors to inject code into running processes, detect and reverse-engineer backdoor implants, reverse-engineer drivers and Botnets, and assess the capabilities of virtual machine-based obfuscation techniques used by malware authors. The course concludes with a capture the flag (CTF) team competition, that encompasses the skills and techniques taught during both the Basic and Advanced Malware Analysis courses.