Looking to get the most out of Binary Ninja? Join one of our upcoming trainings or request a private class for your organization today!
Dates: February 3-6, 2025
Time: 09:00-16:00 ET
Location: Online
Dates: February 24-27, 2025
Time: 09:00-16:00 ET
Location: RE//verse
Interested in hearing about Binary Ninja trainings? Sign up for our newsletter to never miss out on a training announcement or early-bird discount!
All courses include a non-commercial license for Binary Ninja including one year of updates which can be upgraded to Commercial or extend an existing license.
All courses include a one-week trial of Sidekick redeemable within one month from the start of class.
Most scheduled trainings run for 4 or 5 days, with two 3-hour training sessions a day. All trainings are available in 1 to 5 day formats, and an 8-hour schedule is available for those who require it, though it covers no additional material.
Students will require a computer to run Binary Ninja, interact through Discord/Zoom, and write scripts in Python. In-class exercises are provided for Mac and Linux executable formats, so some students may elect to bring a VM.
Certificates of participation and completion are provided upon request and in most cases can be redeemed for Class-A credit hours toward cert renewals. Check with your cert provider for additional requirements and how to redeem.
All public courses include one week exclusive access to instructors, and one week of view-only full-class recording access.
Unsure which class to take? Take our quiz!
For students, hobbyists, and entry-level employees just starting out with reverse engineering. This class will take anyone from "zero" to "hero"! No prior knowledge of assembly, binary formats, or reverse engineering is required.
We'll explore what happens to source code when it gets compiled, what gets lost, and what's involved in recovering an understanding of that code. Students will learn how to leverage Binary Ninja to reverse engineer programs for any architecture. Examples from several popular machine code architectures will be provided (such as x86 and ARM) for students to learn when they need to inspect the disassembly and how to read it without needing to be an expert. Variable storage, register allocation, how the stack works, type recovery, basic vulnerability classes, and much more will all be covered. For more information, see the full syllabus.
For all cybersecurity professionals looking to improve their skills. Whether you want to understand programs faster, find more bugs, explore strange architectures and platforms, or anything else Binary Ninja enables, this class is for you. Each class is tailored to the preferences of the students, ensuring that we address precisely what you require to excel in your role. Wherever you are, this course will cover everything you need to know to boost your skills to the next level!
Students should be familiar with the stack, heap, assembly, and general reverse engineering concepts. For more information, see the full syllabus.
An advanced class with our good friends from Margin Research. PAVR covers the fundamentals of using Binary Ninja and program analysis with an emphasis on combining them to find new software vulnerabilities.
Students must be familiar with basic vulnerability classes such as stack-based buffer overflows, type confusion, sign extension vulnerabilities, etc, and what those look like in source code/a binary. For more information, see the full syllabus.
Want to focus on something specific? Need to mix-and-match existing offerings? We'd be happy to work with you so that you can get the most out of Binary Ninja!
Class | Dates | Location |
---|---|---|
Novice to Ninja | October 7-10, 2024 (GMT) | Online |
Intermediate Reverse Engineering and Automation | November 18-21, 2024 (ET) | Online |
Program Analysis for Vulnerability Research | June 24-27, 2024 (ET) | REcon 2024 |
Program Analysis for Vulnerability Research | May 6-9, 2024 (CEST) | OffensiveCon 2024 |
Novice to Ninja | April 22-25, 2024 (EDT) | Online |
Intermediate Reverse Engineering and Automation | November 6-9, 2023 (ET) | Washington DC and online |
Program Analysis for Vulnerability Research | October 2-6, 2023 (ET) | Online |
Program Analysis for Vulnerability Research | July 17-21, 2023 (BST) | Online - Private Customer |
Program Analysis for Vulnerability Research | June 5-8, 2023 (ET) | REcon 2023 |
Program Analysis for Vulnerability Research | May 15-18, 2023 | OffensiveCon 2023 |
Intermediate Reverse Engineering and Automation | May 1-4, 2023 | Online |
Intermediate Reverse Engineering and Automation | April 3-7, 2023 | Private Customer |
Intermediate Reverse Engineering and Automation | March 27-31, 2023 | Private Customer |
Program Analysis for Vulnerability Research | November 29 - December 2, 2022 | Private Customer |
Intermediate Reverse Engineering and Automation | November 7-11, 2022 | Private Customer |
Program Analysis for Vulnerability Research | May 30 - June 2, 2022 | REcon 2022 |
Program Analysis for Vulnerability Research | January 31 - February 3, 2022 | OffensiveCon 2022 |
Program Analysis for Vulnerability Research | 2022 | Online |
Program Analysis for Vulnerability Research | 2021 | Online |
Program Analysis for Vulnerability Research | August 10-14, 2020 | RingZer0 |
Binary Ninja Training | April 5-6, 2019 | Kernelcon |
Binary Ninja Training | 2019 | Private Customer |
Learn Reverse Engineering Through Game Hacking | March 21, 2018 | Insomni'hack |
Program Analysis for Vulnerability Research | 2017 | Infiltrate |
Binary Ninja Training | 2017 | Private Customer |
Binary Ninja Training | 2017 | Private Customer |
Binary Ninja Training | 2016 | Private Customer |