Maximize your reversing skills! Many who are employed as analysts or programmers may not have had the time to learn assembly language - a skill that will save them precious time when effective analysis is needed most. Designed for malware analysts and developers alike, this course will equip students with the know-how to effectively read assembly, understand statements, and reverse engineer machine code back to its higher-level equivalent. Discover how a compiler transforms high-level code into machine code, learn common assembly statements you'll see used in the real-world applications and malware, and then learn to write your own code during this week-long, lab-intensive course. If you are looking to develop some serious malware analysis skills then this course is the place to start.
Stack Memory, Heap Memory, Stack Tracing.
Common Assembly Instructions.
x86 Addressing Modes.
Repetition, Branching, and Function Calls.
Writing ASSM Statements in C.
Encryption and Obfuscation of Assembly.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.