Through the user interactive labs the student will learn:
The course provides anyone new to the world of reverse engineering and malicious code a high-level overview. The goal is to demystify the process and provide insight anyone wishing to delve deeper into the realm of malicious code analysis. At the end of this course you will be able to identify different code structures, be able to describe how low-level computing works, and understand the different mechanisms (threats) of the major types and a few subtypes of malware. You will also be able to tell a good in-depth malware report from a low effort one with ease.
Date & Time
(Online) Sep 15
1205 Sam Bass Road, Suite 300
Round Rock, TX 78681
- Individuals new to reverse engineering and with a need to understand its fundamentals
- Professionals who deal with technical issues but feel they do not have enough background in how malicious code functions or is built
- Technical professionals that need to be armed with greater knowledge of incident response, malware and the role it places in compromising companies
Chris Rogers has over two decades of direct experience with technology and security. Chris started off his career in DoD and continued that work with a number Fortune 50 companies. Chris has served in a diverse number of industry roles, including exploring experimental technologies, criminal forensics, intrusions, and investigations.
- Laptop required
- Requires basic knowledge of computers, technology and command line interface (CLI)
- Assume students can open and operate browsers, find and use the command line, execute scripts and open programs
- Prior Reverse Engineering or malicious code experience not required
- Understanding of virtual machines (VM) and how to use one.
- Assume students understand how to import and power on a VM
Certification of Completion
2) History of Reverse Engineering
– Ancient World
– Industrial Revolution
– Modern Era
3) Code Structures and Models
– High level languages
– Low level languages
– Machine level Languages
4) Enter the Matrix
– How computers work
– Dissasembler vs Debugger
Due the dry nature of the first three topics the majority of the classes “hands on” modules and activities will take place in and after module 4.
5) Into to Malcode
6) Reading Reports
– What makes a good report?
– Asking the right questions as a customer.
7) Wrap up and Close