Module 1 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 41 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:00
all right, So let's conclude our Ari preparation module and summarize what we've learned
00:08
in Module one, Ari preparation. We reviewed the reverse engineering, um, our analysis process and we compared and contrast it to to. Also, during our discussion, we give a brief overview of the reverse engineering analysis tools and how they could be used.
00:23
Then we discussed how to handle computer malware as well as identification techniques such as hashing and how hashing works.
00:32
Then we looked at the p e file format, understood different Windows components such as Windows memory, virtual addressing, Windows, AP functions and libraries.
00:42
Then we wrapped up our module by giving an overview of the different malware components and distribution channels.
00:49
All right, everyone. So that wraps up our R E preparation module in module to will be investigating the X 64 X 86 architectures
Up Next
Advanced Malware Analysis: Redux

In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.

Instructed By