Course Overview
Learning Objectives
- Use IDA Pro, OllyDbg, x64dbg, and other tools to analyze and debug malware, and report on its capabilities
- Describe in detail the structure and functions of the Portable Executable (PE) header, and analyze PE headers to aid in malware characterization
- Apply techniques for identifying, analyzing, and bypassing data obfuscation
- Understanding the structure and use of Dynamic Linked Libraries (DLLs) and apply reverse engineering skills to DLL analysis
- Identify and overcome a range of anti-debugging and anti-analysis techniques used in modern malware
- Identify developer code in a compiled binary
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):