
Josh Stroschein
Pluralsight Author
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.
Topics Authored
Security Professional
Courses Authored
19
Total Ratings
308
Avg Course Ratings
4.7
Courses by Josh
-
Labs
OT Malware Analysis: FrostyGoopBeginner
3h 15m
Feb 18, 2025
Course
OT Malware Analysis: FrostyGoopBeginner
41m 10s
Dec 17, 2024
Course
Specialized Malware: .NET MalwareAdvanced
53m 30s
Oct 25, 2024
Course
Ghidra Concepts and Basic FunctionalityIntermediate
43m 48s
Aug 15, 2024
Course
Malware Analysis: Assembly BasicsIntermediate
1h 28m 8s
Jul 03, 2024
(14)Course
Malware Analysis: Malicious Activity DetectionIntermediate
1h 48m
Jan 19, 2024
Course
Malware Analysis: Initial Access TechniquesIntermediate
1h 40m 38s
Nov 10, 2023
(11)Course
Malware Analysis: Initial File TriageIntermediate
1h 35m 35s
Jul 17, 2023
Course
IDA Pro Concepts and Basic FunctionalityIntermediate
1h 6m 8s
Mar 02, 2023
Course
Dridex Banking TrojanIntermediate
1h 57m 46s
May 11, 2021
Course
Network Analysis with ArkimeIntermediate
45m 35s
Dec 11, 2020
(14)Course
Initial Access with LuckystrikeIntermediate
34m 39s
Aug 03, 2020
(11)Course
Malware Analysis: Identifying and Defeating Code ObfuscationIntermediate
2h 22m 48s
May 22, 2020
(31)Course
Defeating Anti-reverse Engineering and Anti-debugging TechniquesAdvanced
1h 53m 23s
Jan 24, 2020
(26)Course
Malware Analysis: Identifying and Defeating PackingIntermediate
2h 17m 42s
Jun 04, 2019
(36)Course
Getting Started with Reverse EngineeringBeginner
3h 40m 23s
Dec 28, 2018
(95)Course
Analyzing Malware for .NET and Java BinariesIntermediate
1h 42m 17s
Apr 19, 2018
(43)
-
Course
OT Malware Analysis: FrostyGoopBeginner
41m 10s
Dec 17, 2024
Course
Specialized Malware: .NET MalwareAdvanced
53m 30s
Oct 25, 2024
Course
Ghidra Concepts and Basic FunctionalityIntermediate
43m 48s
Aug 15, 2024
Course
Malware Analysis: Assembly BasicsIntermediate
1h 28m 8s
Jul 03, 2024
(14)Course
Malware Analysis: Malicious Activity DetectionIntermediate
1h 48m
Jan 19, 2024
Course
Malware Analysis: Initial Access TechniquesIntermediate
1h 40m 38s
Nov 10, 2023
(11)Course
Malware Analysis: Initial File TriageIntermediate
1h 35m 35s
Jul 17, 2023
Course
IDA Pro Concepts and Basic FunctionalityIntermediate
1h 6m 8s
Mar 02, 2023
Course
Dridex Banking TrojanIntermediate
1h 57m 46s
May 11, 2021
Course
Network Analysis with ArkimeIntermediate
45m 35s
Dec 11, 2020
(14)Course
Initial Access with LuckystrikeIntermediate
34m 39s
Aug 03, 2020
(11)Course
Malware Analysis: Identifying and Defeating Code ObfuscationIntermediate
2h 22m 48s
May 22, 2020
(31)Course
Defeating Anti-reverse Engineering and Anti-debugging TechniquesAdvanced
1h 53m 23s
Jan 24, 2020
(26)Course
Malware Analysis: Identifying and Defeating PackingIntermediate
2h 17m 42s
Jun 04, 2019
(36)Course
Getting Started with Reverse EngineeringBeginner
3h 40m 23s
Dec 28, 2018
(95)Course
Analyzing Malware for .NET and Java BinariesIntermediate
1h 42m 17s
Apr 19, 2018
(43)