Description
Course info
Rating
(41)
Level
Intermediate
Updated
Mar 29, 2017
Duration
2h 3m
Description

In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.

About the author
About the author

Dr. Jared DeMott is an engineer, entrepreneur, and security leader. He holds a PhD from Michigan State University. He regularly speaks on cyber matters at conferences like RSA, DerbyCon, BlackHat, ToorCon, GrrCon, HITB, etc. Jared is a Pluralsight author, and is often interviewed by Media to weigh in on cyber matters.

More from the author
Security for Hackers and Developers: Fuzzing
Intermediate
2h 9m
Dec 14, 2016
More courses by Dr. Jared DeMott