Getting Started with Reverse Engineering
Course info



Course info



Description
The ability to reverse engineer binary code is an essential skill for anyone responsible for software security or performing malware analysis, and it even plays a significant role in performing penetration tests and incident response. In this course, Getting Started with Reverse Engineering, you will gain the skills necessary to reverse engineer native code and determine program behavior. First, you will discover the basic elements of modern CPU architecture and the essentials of assembly language. Next, you will learn about native code, the portable executable file format and techniques to enrich your reverse engineering efforts. Finally, you will explore proficiency in the tools and techniques associated with performing static and dynamic reverse engineering to include IDA Pro and WinDbg. Throughout this course you will be able to follow along through comprehensive demonstrations and apply yourself through hands-on labs. By the end of this course, you will have the knowledge and skills necessary to reverse engineer native code binaries.
Section Introduction Transcripts
Course Overview
[Autogenerated] Hi, everyone. My name is Dr Josh Stroshine and I want to welcome you to getting started with reverse engineering. I am an assistant professor, cybersecurity Dakota State University, senior security researcher at BD A Labs and, um, our analyst for Bro Me. Um, the ability to reverse engineer binary code is an essential skill for anyone responsible for software security, performing malware analysis and even plays a significant role in performing ___________ tests and incident response. In this course, we're going to learn how to quickly and effectively reverse engineer this binary code to determine program characteristics and behaviors. Some of the major topics that we will cover include the essential elements of modern CPU architecture and assembly language, native coat and binary file formats such as the portable execute herbal file formats and techniques to enrich your reverse engineering efforts, and finally to gain proficiency and the tools and techniques associated with performing both static and dynamic analysis. This will include both Ida pro and Window, but throughout this course, you'll be able to follow along through comprehensive demonstrations and apply yourself through hands on labs, and by the end of this course, you will have the knowledge and skills necessary to reverse engineer native code buying years before beginning the course. Some basic Familiarization with assembly language will be helpful, but certainly not required. I hope you'll join me on this journey toe. Learn how to reverse engineer with getting started with reverse engineering at plural site.