Locations: Online
Course Description: This Course Will Give You:
You will learn in practice the most important techniques of reverse engineering: static and dynamic analysis. You will get acquainted with low-level and system programming, examine in detail aspects of the internal structure of Windows. You have to study and classify malware using examples of real malware caught on the net.
WHAT IS REVERSE ENGINEERING? Code reverse engineering (code reverse engineering) is the process of analyzing the machine code of a program, which aims to understand the principle of operation, restore an algorithm, discover undocumented program capabilities, etc. The main methods of reverse engineering are static or dynamic code analysis. In static analysis, the researcher disassembles the program code using special software, and then analyzes the assembler code. In dynamic analysis, the researcher runs the code in an isolated environment (sandbox) or debugger and analyzes the code in dynamics.
Who is This Course For?
For system programmers developing low-level software. You will understand how the code works internally after compilation and you can improve the quality of your solutions.
For novice virus analysts and information security specialists. You will learn all of the must have reverse engineering practices and gain a comprehensive understanding of malware.
Prerequisite Knowledge:
Knowledge of computer architecture at the initial level
Basic knowledge of Windows internals
Experience in C / C ++ programming will be an advantage (this is an optional condition)
Hardware requirements: processor with a clock speed of 2.0 GHz or higher, 8 GB of RAM, 100 GB of free hard disk space