Shoping Cart

Your cart is empty now.

Shoping Cart

Your cart is empty now.

The ability to reverse engineer binary code is an essential skill for anyone responsible for software security or performing malware analysis, and it even plays a significant role in performing penetration tests and incident response.

By the end of this course, you will have the knowledge and skills necessary to reverse engineer.

What you will learn:

  • Recognizing Encryption Algorithms in Malware.
  • Understanding Common Malware Injection Techniques.
  • RIG Exploit Kit Chain Internals.
  • Dissecting FIN6 Framework POS _ point of sale Malware Analysis & Internals.
  • Analyzing Shellcode usage in Malware.
  • Deep insight into FIN7 Malware Chain.
  • How Malware uses Privilege Escalation to Compromise Devices.
  • How Threat Actors Gain an Initial Foothold. 
  • How Trickbot Hooking Engine Targets Windows10 Browsers.
  • Understanding the Persistence Mechanism in Malware.
  • Crimeware & APT Journey from Robinhood to APT28.

 

translation missing: en.general.search.loading