Online Training: Practical Foundations of ARM64 Windows Debugging, Disassembling, Reversing

Software Diagnostics Services organizes this online training course.

Practical Foundations of ARM64 Windows Debugging, Disassembling, Reversing Logo

February 9 - 13, 2026, 12:30 pm - 1:30 pm (GMT) Price 49 USD Registration for 5 one-hour sessions

This training course is an ARM64 version of the best-selling Practical Foundations of Windows Debugging, Disassembling, Reversing book which drew inspiration from the original lectures we developed more than 22 years ago to train support and escalation engineers in debugging and crash dump analysis of memory dumps from Windows applications, services, and systems. When considering the material to deliver, we realized that a solid understanding of fundamentals, such as pointers, is necessary to analyze stack traces beyond a few WinDbg commands. Therefore, this book was not about bugs or debugging techniques but about the background knowledge everyone needs to start experimenting with WinDbg, learn from practical experience, and read other advanced debugging books. This body of knowledge is what the author of this book possessed before starting memory dump analysis using WinDbg 22 years ago, which led to the number-one debugging bestseller: the multi-volume Memory Dump Analysis Anthology (Diagnomicon). Now, in retrospect, we see these practical foundations as relevant and necessary for beginners, just as they were 22 years ago, because the internals of operating systems, assembly language, and compiler architecture haven't changed significantly in those years.

Please see the x64 book's TOC for the approximate content.

After the training, you get:

  • The PDF book edition
  • Personalized Certificate of Attendance with unique CID
  • Answers to questions during training sessions
  • Training sessions recording

Audience:

  • Software technical support and escalation engineers
  • Software engineers coming from x86/x64, managed code, or JVM background
  • Software testers
  • Engineers coming from non-Wintel environments
  • Windows C and C++ software engineers without an assembly language background
  • Security researchers without ARM64 assembly language background
  • Beginners learning Windows software reverse engineering techniques