This course is a collection of a practical examples of reverse engineering malware with the intent of consistently updating new examples.