Calls, Strings and Codes Course

Learn how to do basic input and output, work with strings and condition codes at the x86 Assembly level. Then try your hand at your first project by building your own x86 Assembly program.

1 hour, 16 minutes

Course description

In this course, we'll learn how to do basic input and output (i/o) operations at the assembly level, including how to store and work with strings. Then you'll try your hand at your first project of building an application written entirely in x86 Assembly. Finally, we'll look at condition codes and how the x86 processor handles tracking the state of certain processor conditions.

Syllabus

Condition Codes: How x86 Handles Condition Codes Generated by the CPU and Why They Matter

Video - 00:30:00

This video covers conditional codes that are used to store state on the processor CPU. We'll look at what the different codes mean and how to affect their state.
Strings/ASCII: How to Work with Strings and ASCII in x86

Video - 00:08:00

This video covers the concept of strings and how they are used and stored in x86 Assembly.
LAB: Hello World! Creating the Usual Hello World in x86

Video - 00:20:00

This project will guide you through building an application written entirely in x86 Assembly.
Input and Output: x86 System Calls

Video - 00:19:00

This video covers basic I/O operations and how we can leverage the operating system at the assembly level to perform these tasks.

Meet the author

Stephanie Domas

Stephanie Domas is the Chief Security Technology Strategist at Intel. Here, she defines and oversees execution of security technology strategies that achieve roadmap discipline, horizontal alignment and market differentiation to accelerate Intel's competitiveness in the area of Security. Partnered closely with business and industry strategists and security architects she leads a one Intel security technology vision and strategy. Prior to joining Intel Stephanie built and lead two successful cybersecurity businesses spanning professional services and Security Software in medical devices, healthcare, and embedded systems

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator
  • Data Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust