Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Reverse Engineering & Malware Analysis
Section 1 Introduction
S1.1. Introduction (11:48)
S1.2. Introduction to Assembly Language (25:35)
Section 2 Reverse Engineering
S.2.3 Reverse Engineering - Overview of PE Header (11:45)
S.2.4 Reverse Engineering - Practical Analysis of PE Header (9:45)
S.2.5 Disassembly and Debugging (3:44)
S.2.6 Reverse Engineering - Disassembly and Debugging (20:42)
Section 3 Malware Anaysis
S.3.7 Types of Malware Analysis (4:24)
S.3.8 Memory Forensics (4:03)
S.3.9 Memory Forensics (7:53)
S.3.10 Shellcode Analysis (Part I) (2:36)
S.3.11 Shellcode Analysis (Part II) (5:22)
S.3.12 Analyzing Malicious Documents (Part I) (3:57)
S.3.13 Analyzing Malicious Documents (Part II) (6:12)
S.3.14 AV Evasion (3:09)
S.3.15 Packers and Cryptors (Part I) (6:06)
S.3.16 Packers and Cryptors (Part II) (6:30)
S.3.17 Anti-Emulation & Anti-Debugging Techniques (Part I) (8:18)
S.3.18 Anti-Emulation & Anti-Debugging Techniques (Part II) (6:00)
Reverse Engineering & Malware Analysis (PDF)
Reverse Engineering & Malware Analysis (PDF)
Reverse Engineering & Malware Analysis Quiz
Test Your Learning
S.3.11 Shellcode Analysis (Part II)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock