3 hours 41 minutes
all right, So let's conclude our Ari preparation module and summarize what we've learned
in Module one, Ari preparation. We reviewed the reverse engineering, um, our analysis process and we compared and contrast it to to. Also, during our discussion, we give a brief overview of the reverse engineering analysis tools and how they could be used.
Then we discussed how to handle computer malware as well as identification techniques such as hashing and how hashing works.
Then we looked at the p e file format, understood different Windows components such as Windows memory, virtual addressing, Windows, AP functions and libraries.
Then we wrapped up our module by giving an overview of the different malware components and distribution channels.
All right, everyone. So that wraps up our R E preparation module in module to will be investigating the X 64 X 86 architectures
Advanced Malware Analysis: Redux
In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.