YoVDO

Security for Hackers and Developers: Reverse Engineering

Offered By: Pluralsight

Tags

Reverse Engineering Courses Malware Analysis Courses IDA Pro Courses Vulnerability Analysis Courses Static Analysis Courses

Course Description

Overview

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.

Syllabus

  • Course Overview 1min
  • Using IDA Pro to Reverse Code 30mins
  • Learning x86 and Calling Conventions 23mins
  • Understanding C-to-Assembly and Compiled Structures 13mins
  • Patching a Compiled Binary 15mins
  • Reversing C++ 17mins
  • Extending IDA with Scripts 22mins

Taught by

Dr. Jared DeMott

Related Courses

How to Use IDA (BSWJ)
Cybrary
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent
Reverse Engineering for Beginners
begin.re via Independent
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
IDA Pro Concepts and Basic Functionality
Pluralsight