We are engaged in an ever-evolving war with the malicious coder; one in which they employ a diverse, complex skill set to armor, hide and defend their malware as well as obscure its purpose and actions. The reverse engineer plays a pivotal role in this war and the Intermediate Reverse Engineering course will equip them with the skills they need to debug and disassemble the most complex of code. Building on their foundation from the Assembly for Reverse Engineers and Malware Reverse Engineering courses, students will learn the Intel MMU, Linux Reverse Engineering and Reverse Engineering C++ code on both Windows and Linux platforms. Students will also learn the techniques and patterns required for developing effective IDA Python scripts, a necessary skill for efficient analysis of binaries, as well as reverse engineering malware and code samples in a mixture of both 32-bit and 64-bit binaries.
Intel Microprocessor Memory Management
Reversing C++ programs in Microsoft Windows and Linux, including C++ class structures and virtual function tables in Intel Assembly
32/64-bit Function Calling Conventions in C/C++ for Microsoft Windows and Linux
ELF Headers and Associated Structures
Automating analysis with scripting
Analyzing Assembly derived from other high-level languages such as Java
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.