Reverse engineering is one of the hardest but ultimately rewarding skills in cyber security. By completing this programme, you will gain hands-on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact.
Malware and Reverse Engineering
This skill series takes you through the basics of how modern day computers work. You’ll gain an understanding of different computer architectures, hardware, software, and the operating systems that everyone interacts with daily.
Introduction to Reverse Engineering
Reverse engineering is one of the hardest but ultimately rewarding skills in cyber security. By completing this series of labs, you will gain hands-on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact
Malware is always developing, so you should always aim to stay on top of your game when it comes to malware analysis skills and threat awareness. In this series, you will be introduced to a variety of industry-standard tools used to investigate malicious samples.
Exploits are what keep many cyber professionals in a job, so you need to know how they come about. With an understanding of how computers work, this skill series will show you how to change the execution flow of software in various scenarios to eventually run your own code.
Indicators of Compromise (IoC) serve as forensic evidence of potential intrusions on a host system or network. This skill series focuses on extracting IoCs from malware actively being used by threat actors and malicious groups.
Radare2 is a project designed to aid in reverse engineering. It can analyse files designed for various architectures such as x86, x86_64, ARM, MIPS, and many more. Open-source and free, Radare2 is also an incredibly powerful tool when used correctly.