Description
Course info
Rating
(30)
Level
Intermediate
Updated
Mar 29, 2017
Duration
2h 4m
Description

In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.

About the author
About the author

Dr. Jared DeMott is the founder of the security company, Vulnerability Discovery & Analysis (VDA) Labs. DeMott is a former NSA security analyst, Microsoft BlueHat Prize winner, and was the CTO and Binary Defense. He's frequently quoted in media, and invited to speak at security events.

More from the author
Security for Hackers and Developers: Fuzzing
Intermediate
2h 9m
Dec 14, 2016
More courses by Dr. Jared DeMott
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Dr. DeMott, and welcome to my course on Reverse Engineering. This is the fourth class in the Security for Hackers and Developers learning path. I'm the founder of code security and ethical hacking company, VDA Labs. I'm a long-time security researcher, vulnerability, malware, and enterprise security expert. And I love teaching and mentoring, so I'm so happy to bring you another exciting class. Did you know that bugs in software cost the economy billions of dollars each year? In this course, we're going to turn the tide as I explain how to protect intellectual property, find vulnerabilities, and analyze malware all by learning to reverse engineer with IDA Pro and Binary Ninja. With a hands-on style, we'll cover topics such as tools and technique basics, assembly language and calling conventions, patching binaries, and extending IDA with scripts and plugins. By the end of the course, you'll know how to reverse both C and C++ programs with confidence, which gives you the skills to bug hunt or take a part malware. Before beginning the course, you should take the first three classes in the Security for Hackers and Developers learning path. After completing this course, you'll feel comfortable with my Advanced Malware Analysis: Combating Exploit Kits course, and coming later in 2017, the final course in the Security for Hacker and Developers learning path, the Exploit Development class. I hope you'll join me on this cyber security journey with the Security for Hackers and Developers Reverse Engineering course at Pluralsight.