This fundamental course teaches you the theoretical and practical knowledge required to perform advanced reverse engineering of software on assembly level in third party software and/or malware.
Through a series of lessons, which also involve several challenges to be solved and to play with, you will be taught all the necessary skills to succeed as a professional reverse engineer (and not just acquire a superficial understanding of how to use reversing tools).
The training is based on Windows NT OS, since malware & vulnerability researchers as well as software pirates still mostly target this operating system.
During your advanced reverse engineering training you will learn several methods used to identify, isolate, and finally analyse the portions of any code which are of high interest. You also learn about the most common Windows APIs utilized for file, memory and registry manipulation by either software protections (such as packers) or malware.
Additionally, the training does also focus on several packers in order to give you as the student all the essential knowledge and understanding of manual unpacking. This is one of the most important parts of advanced reverse engineering.
On top of all these exciting topics, you will also get insights into the most common anti-reversing tricks, including different code obfuscation methods. Not only will you analyse their mechanisms, but also learn how these can be bypassed in order to successfully perform the reverse engineering process.
Who should take this course?
This advanced reverse engineering training course is highly practical, meaning you will learn things by yourself and not just listen to some instructors and watch. If you like the "learning-by-doing" approach, then this is for you. This is NOT a "learn - repeat - forget" type of training. The course guidance ensures that you will get all the necessary knowledge along the way.
The Advanced Reverse Engineering of Software training course is obviously one of the basics for the current or future malware researcher. If you are involved in any kind of software development, you will benefit from learning how pirates attempt to bypass your protection, and in turn be able to create more sophisticated and smart ways to keep pirates away as efficiently as possible.
This course definitely benefits you if you are a penetration tester, security analyst, antivirus researcher, software developer, software tester, malware researcher, government IT staff, computer forensics expert, IT security expert, mobile application developer, game developer, incident response team member, vulnerability researcher or a web application security expert among others.
Since reverse engineering is based on the complete understanding of computing architecture, this course serves as a great foundation for everyone working in IT positions. With this foundation you will understand even the most complex IT topics more easily.
Who should not take this course?
Sorry, but if you are looking to quickly memorize some theory which you can dump during an exam to get another certificate, this course is NOT for you.
If you are simply looking for user-manuals of reverse engineering tools in course format, then you won't be happy with this highly interactive training course either.
ADVANCE YOUR IT SECURITY CAREER TODAY WITH ELEARNSECURITY