![Josh Stroschein](https://pluralsight.imgix.net/author/lg/08b8e10b-fbd0-420d-bf1b-c959fa95855a.jpg?w=200)
Josh Stroschein
Pluralsight Author
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.
Topics Authored
Security Professional
Contents Authored
18
Total Ratings
304
Avg Course Ratings
4.7
Courses by Josh
-
Course
SecurityOT Malware Analysis: FrostyGoopSecurityBeginner
41m 10s
Dec 17, 2024
Course
SecuritySpecialized Malware: .NET MalwareSecurityAdvanced
53m 30s
Oct 25, 2024
Course
SecurityGhidra Concepts and Basic FunctionalitySecurityIntermediate
43m 48s
Aug 15, 2024
Course
SecurityMalware Analysis: Assembly BasicsSecurityIntermediate
1h 28m 8s
Jul 03, 2024
(13)Course
SecurityMalware Analysis: Malicious Activity DetectionSecurityIntermediate
1h 48m
Jan 19, 2024
Course
SecurityMalware Analysis: Initial Access TechniquesSecurityIntermediate
1h 40m 38s
Nov 10, 2023
Course
SecurityMalware Analysis: Initial File TriageSecurityIntermediate
1h 35m 35s
Jul 17, 2023
Course
SecurityIDA Pro Concepts and Basic FunctionalitySecurityIntermediate
1h 6m 8s
Mar 02, 2023
Course
SecurityDridex Banking TrojanSecurityIntermediate
1h 57m 46s
May 11, 2021
Course
SecurityNetwork Analysis with ArkimeSecurityIntermediate
45m 35s
Dec 11, 2020
(14)Course
SecurityInitial Access with LuckystrikeSecurityIntermediate
34m 39s
Aug 03, 2020
(11)Course
SecurityMalware Analysis: Identifying and Defeating Code ObfuscationSecurityIntermediate
2h 22m 48s
May 22, 2020
(31)Course
SecurityDefeating Anti-reverse Engineering and Anti-debugging TechniquesSecurityAdvanced
1h 53m 23s
Jan 24, 2020
(26)Course
SecurityMalware Analysis: Identifying and Defeating PackingSecurityIntermediate
2h 17m 42s
Jun 04, 2019
(36)Course
SecurityGetting Started with Reverse EngineeringSecurityBeginner
3h 40m 23s
Dec 28, 2018
(94)Course
SecurityAnalyzing Malware for .NET and Java BinariesSecurityIntermediate
1h 42m 17s
Apr 19, 2018
(43)
-
Course
SecurityOT Malware Analysis: FrostyGoopSecurityBeginner
41m 10s
Dec 17, 2024
Course
SecuritySpecialized Malware: .NET MalwareSecurityAdvanced
53m 30s
Oct 25, 2024
Course
SecurityGhidra Concepts and Basic FunctionalitySecurityIntermediate
43m 48s
Aug 15, 2024
Course
SecurityMalware Analysis: Assembly BasicsSecurityIntermediate
1h 28m 8s
Jul 03, 2024
(13)Course
SecurityMalware Analysis: Malicious Activity DetectionSecurityIntermediate
1h 48m
Jan 19, 2024
Course
SecurityMalware Analysis: Initial Access TechniquesSecurityIntermediate
1h 40m 38s
Nov 10, 2023
Course
SecurityMalware Analysis: Initial File TriageSecurityIntermediate
1h 35m 35s
Jul 17, 2023
Course
SecurityIDA Pro Concepts and Basic FunctionalitySecurityIntermediate
1h 6m 8s
Mar 02, 2023
Course
SecurityDridex Banking TrojanSecurityIntermediate
1h 57m 46s
May 11, 2021
Course
SecurityNetwork Analysis with ArkimeSecurityIntermediate
45m 35s
Dec 11, 2020
(14)Course
SecurityInitial Access with LuckystrikeSecurityIntermediate
34m 39s
Aug 03, 2020
(11)Course
SecurityMalware Analysis: Identifying and Defeating Code ObfuscationSecurityIntermediate
2h 22m 48s
May 22, 2020
(31)Course
SecurityDefeating Anti-reverse Engineering and Anti-debugging TechniquesSecurityAdvanced
1h 53m 23s
Jan 24, 2020
(26)Course
SecurityMalware Analysis: Identifying and Defeating PackingSecurityIntermediate
2h 17m 42s
Jun 04, 2019
(36)Course
SecurityGetting Started with Reverse EngineeringSecurityBeginner
3h 40m 23s
Dec 28, 2018
(94)Course
SecurityAnalyzing Malware for .NET and Java BinariesSecurityIntermediate
1h 42m 17s
Apr 19, 2018
(43)
-
No labs authored.