Many analysts and programmers have not yet learned assembly language - a skill that will save them precious time when effective analysis is needed most. Designed for malware analysts and code developers alike, Assembly for Reverse Engineers will equip you with the know-how to effectively read Assembly, review statements, and reverse machine code back to its higher-level equivalent. Learn and practice development techniques to improve the speed and quality of static analysis during this week-long, lab-intensive course.
Learning Objectives
- Describe how code execution works
- Understand the components of the x86 instruction set
- Apply demonstrated analysis techniques to the reverse engineering of Windows executables
- Use IDA Pro's powerful assembly markup features to optimize analysis
- Use static and dynamic analysis to interpret and document program flow
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.