Course Description
which an attacker will typically download the targeted app from an app store and analyze it within their own local environment using a suite of different tools.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Describe what kinds of knowledge reverse engineering may reveal to an attacker
- List mitigation techniques for reverse engineering
Framework Connections
Specialty Areas
- Risk Management
- Software Development
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.