http://opensecuritytraining.info/ReverseEngineeringMalware.html
Assumes: Introductory Intel x86; Introduction to Reverse Engineering
Teaches: Using static reverse engineering to identify common features and behavior of malware, and how to identify and bypass common anti-reverse engineering techniques.
In his current job Frank Poz works on tier 3 analysis of malware and network C2 in support of a network security operations center. There he has worked extensively with tools like IDA, OllyDbg, Wireshark, and a number of custom analysis tools.