Reverse Engineering is a critical skill. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field
Reverse engineering is a vitally important skill for today's expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today's ever evolving threats.
In this 5 day hands-on course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. You will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:
Additionally you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET.
InfoSec Institute will train you on the standard reverse engineering programs IDA Pro, Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.
HOW YOU'LL BENEFIT:
AS SEEN IN:
Learn from Advanced Reversing Experts:
All of the instructors for InfoSec Institute's Reverse Engineering course active work in the field of incident response or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.
Other Reverse Engineering Courses
Advanced Reverse Engineering
Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering.
Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them.
Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.
|Dates||Location||Reserve a Seat!|
|Any Date!||Any Location!||Reverse Engineering Online - More Details Here|
|-||Dulles, VA||Reserve a Seat|
|-||Live Online,||Reserve a Seat|
|-||Live Online,||Reserve a Seat|
|06/09/14-06/13/14||Dulles, VA||Reserve a Seat|
|09/08/14-09/12/14||Live Online,||Reserve a Seat|
|09/08/14-09/12/14||Dulles, VA||Reserve a Seat|
|12/01/14-12/05/14||Dulles, VA||Reserve a Seat|
|12/01/14-12/05/14||Live Online,||Reserve a Seat|
|01/12/31-01/12/31||Online,||Reserve a Seat|
|Any Date|| Your Office!
||Get Information for On-Site Training|
In any hands on reverse engineer training course, it is important to have the opportunity to prove tocurrent or potential employers that you have the skills you say you do. This course prepares you for the top reverse engineering certification in the industry, the CREA. The exam is given on-site, InfoSec Institute has achieved a 93% pass rate for this certification.
InfoSec Institute's Custom Reversing Tools Enterprise Suite, includes every program covered in the course for at home study. (119 Tools).
Small class size provides intimate learning setting not offered at any of our competitors.
5 Full Days of Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.
All meals, snacks and refreshments included. Snacks not included in Las Vegas courses.
Exam Fees included
Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers hacking!
Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued education. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.