ABOUT THE PROGRAM
The course covers the following topics:
DON'T TOUCH THIS TAB
It’s important to improve the accordion’s behaviour
Introduction to ASM x86
- x86 Architecture: Registers, memory, and machine code
- The assembler
- Program memory segments
- Instruction to set architecture: Mnemonics, operands, and Opcodes
- Instruction to set architecture: Mnemonics, operands, and Opcodes
The PE format and WinAPI
- The Portable Executable (PE) format
- Introduction to WinAPI
- Windows internals: Handles, COM, and networking
- Analyzing PE files
Working with Debuggers
- Introduction to debuggers
- Using WinDbg with Windows
- Using Gdb with Linux
- Immunity Debugger
Practical Assembly
- Functions and the stack
- Stack calling conventions
- Conditionals and control structures
- Tracking branching logic
Introduction to IDA
- Loading your first binary
- Leveraging strings and APIs
- Strategies for tracing program behavior
- Reversing Unkown Binary with IDA
Don't touch this tab
ABOUT SOTERIA GLOBAL
SOTERIA Global is a global leader in cyber-security training solutions and services.
The cyber world is now a part of our everyday life. New technology emerges daily, and as opportunities increase, so do cyber risks. Threats constantly evolve, and we must protect our valuable assets.
A successful cyber defense has many factors, but they all have one thing in common: dedicated, skilled individuals.
SOTERIA Global experts develop our solutions and rely on the best technological assets in the market. Our impressive global presence expands over four continents, giving us access to the best cybersecurity professionals.
Our solutions range from customized training programs to developing cyber-oriented facilities, ensuring that individuals and organizations are ready to face real-world threats. Over the years, we have worked with various organizations across many sectors, giving us the skillset to shape and adapt our solutions to meet our client’s needs.
COURSE INFO
Target audience
- Analysts
- Security researchers
- Forensics researchers
- IT specialists
- Incident Response Teams
Prerequisites
- Knowledge of operation systems
- Basic knowledge of Windows Internals
- Familiarity with cyberwarfare methods is advantageous
- Experience programing with C or Assembly is advantageous
Skills Gained
- Perform reverse engineering to investigate malware
- Basic ASM knowledge
- Using WinAPI
- Working with debuggers
- Using IDA