YoVDO

Security for Hackers and Developers: Reverse Engineering

Offered By: Pluralsight

Tags

Reverse Engineering Courses Malware Analysis Courses IDA Pro Courses Vulnerability Analysis Courses Static Analysis Courses

Course Description

Overview

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.

Syllabus

  • Course Overview 1min
  • Using IDA Pro to Reverse Code 30mins
  • Learning x86 and Calling Conventions 23mins
  • Understanding C-to-Assembly and Compiled Structures 13mins
  • Patching a Compiled Binary 15mins
  • Reversing C++ 17mins
  • Extending IDA with Scripts 22mins

Taught by

Dr. Jared DeMott

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy