Course Description
which an attacker will typically download the targeted app from an app store and analyze it within their own local environment using a suite of different tools.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Describe what kinds of knowledge reverse engineering may reveal to an attacker
- List mitigation techniques for reverse engineering