http://opensecuritytraining.info/IntroductionToReverseEngineering.html
Assumes: C/C++ development experience; Introductory Intel x86
Teaches: Using static reverse engineering to identify common features and behavior of executable software.
In his current job Frank Poz works on tier 3 analysis of malware and network C2 in support of a network security operations center. There he has worked extensively with tools like IDA, OllyDbg, Wireshark, and a number of custom analysis tools.