Learning Outcomes:
● Learn key concepts and techniques of static reverse engineering
● x86 assembly programing
● Common code structures introduced by compilers
● Windows PE format
● Common approaches to reverse engineering using interactive disassembly and interactive
debugging
● Determining behavioural characteristics of a malware executable using dynamic analysis
● Practical skills with IDA Pro interactive disassembler, OllyDbg interactie debugger, Cuckoo Sandbox.
Indicative Module Content:
● Assembly programming (intel x86)
● Identifying high-level C language structures in compiled code
● Windows Portable Executable format
● IDA Pro disassembler, Cuckoo sandbox