A Certificate of Completion is offered for each class.
The world of the virtual OS has become a fact of life in the modern infrastructure. However, this new field brings with it new attack vectors that need to be recognized and guarded against. These classes will give you the tool-set to better plan the deployment in order to optimize security.
Learn how to manually unpack the most advanced obfuscation protections.
This course will have 4 components: reverse engineering, source code auditing, fuzzing, and exploitation. Each section contains a liberal amount of labs and hands-on exercises.
No Source? No Symbols? No Problem.
This introductory course is for those interested in entering the field of malicious software analysis.
Essential background material for effective reverse engineering.
This two day class will cover useful techniques and methods for incident response in the field when machines are suspected of intrusion with stealthy malware.
This class is meant to impart cutting-edge understanding of malicious code analysis upon attendees, ultimately taking them to an advanced level of reverse engineering skills applicable to other security domains.