• Classroom
Course Description

Many analysts and programmers have not had the time or opportunity to learn assembly language, yet this is a skill that will save them precious time when effective analysis is needed the most. Designed for malware analysts and code developers alike, Assembly for Reverse Engineers will equip students with the know-how to effectively read assembly, review statements, understand program flow, identify the influence of different compilers, and reverse machine code back to its higher-level equivalent. They will learn and practice development techniques to improve the speed and quality of static analysis.

Learning Objectives

  1. Describe how code execution works
  2. Understand the components of the x86 instruction set
  3. Apply demonstrated analysis techniques to the reverse engineering of Windows executables
  4. Use IDA Pro’s powerful assembly markup features to optimize analysis
  5. Use static and dynamic analysis to interpret and document program flow

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.