• Classroom
  • Online, Instructor-Led

Learning Objectives

  • Use IDA Pro, OllyDbg, x64dbg, and other tools to analyze and debug malware, and report on its capabilities
  • Describe in detail the structure and functions of the Portable Executable (PE) header, and analyze PE headers to aid in malware characterization
  • Apply techniques for identifying, analyzing, and bypassing data obfuscation
  • Understanding the structure and use of Dynamic Linked Libraries (DLLs) and apply reverse engineering skills to DLL analysis
  • Identify and overcome a range of anti-debugging and anti-analysis techniques used in modern malware
  • Identify developer code in a compiled binary

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):