Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Getting Started with Reverse Engineering

Description

Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. Learn how to reverse binary code to ID program characteristics and behavior.

The ability to reverse engineer binary code is an essential skill for anyone responsible for software security or performing malware analysis, and it even plays a significant role in performing penetration tests and incident response. In this course, Getting Started with Reverse Engineering, you will gain the skills necessary to reverse engineer native code and determine program behavior. First, you will discover the basic elements of modern CPU architecture and the essentials of assembly language. Next, you will learn about native code, the portable executable file format and techniques to enrich your reverse engineering efforts. Finally, you will explore proficiency in the tools and techniques associated with performing static and dynamic reverse engineering to include IDA Pro and WinDbg. Throughout this course you will be able to follow along through comprehensive demonstrations and apply yourself through hands-on labs. By the end of this course, you will have the knowledge and skills necessary to reverse engineer native code binaries.

Topics:

  • Course Overview
  • Introduction
  • Assembly Basics
  • Working with Native Code
  • Using Debuggers
  • Practical Assembly
  • Reverse Engineering
  • Conclusion

Tags

Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108

Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/mooc/view.php on line 118
Novel Writing Anatomy
Online Course


Getting Started with Reverse Engineering

Affiliate notice

Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. Learn how to reverse binary code to ID program characteristics and behavior.

The ability to reverse engineer binary code is an essential skill for anyone responsible for software security or performing malware analysis, and it even plays a significant role in performing penetration tests and incident response. In this course, Getting Started with Reverse Engineering, you will gain the skills necessary to reverse engineer native code and determine program behavior. First, you will discover the basic elements of modern CPU architecture and the essentials of assembly language. Next, you will learn about native code, the portable executable file format and techniques to enrich your reverse engineering efforts. Finally, you will explore proficiency in the tools and techniques associated with performing static and dynamic reverse engineering to include IDA Pro and WinDbg. Throughout this course you will be able to follow along through comprehensive demonstrations and apply yourself through hands-on labs. By the end of this course, you will have the knowledge and skills necessary to reverse engineer native code binaries.

Topics:
  • Course Overview
  • Introduction
  • Assembly Basics
  • Working with Native Code
  • Using Debuggers
  • Practical Assembly
  • Reverse Engineering
  • Conclusion

Tags


Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108

Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/mooc/view.php on line 707
Novel Writing Anatomy