Skip to main content

Assembly for Reverse Engineers

Many analysts and programmers have not yet learned assembly language - a skill that will save them precious time when effective analysis is needed most. Designed for malware analysts and code developers alike, Assembly for Reverse Engineers will equip you with the know-how to effectively read Assembly, review statements, and reverse machine code back to its higher-level equivalent. Learn and practice development techniques to improve the speed and quality of static analysis during this week-long, lab-intensive course.


Request Course Details


Attending students will learn

  • Data Representation
  • Stack Memory, Heap Memory, Stack Tracing
  • Common Assembly Instructions
  • x86 Addressing Modes
  • Repetition, Branching, and Function Calls
  • Writing ASSM Statements in C
  • Encryption and Obfuscation of Assembly

Who should attend

  • Forensic Investigators who need to identify and examine malicious code on systems
  • Exploitation Analysts needing reverse engineering skills
  • Penetration Testers who want to develop their own tools
  • Malware Analysts requiring a thorough understanding malicious code

Prerequisites

  • Previous knowledge of C programming as well as a solid understanding of operating systems is recommended.
  • Introduction to C Programming and Operating Systems Fundamentals are good preparatory classes.

Courses That Follow This Course

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...
VIEW MORE TWEETS >