Module 1 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
all right, So let's conclude our Ari preparation module and summarize what we've learned
00:08
in Module one, Ari preparation. We reviewed the reverse engineering, um, our analysis process and we compared and contrast it to to. Also, during our discussion, we give a brief overview of the reverse engineering analysis tools and how they could be used.
00:23
Then we discussed how to handle computer malware as well as identification techniques such as hashing and how hashing works.
00:32
Then we looked at the p e file format, understood different Windows components such as Windows memory, virtual addressing, Windows, AP functions and libraries.
00:42
Then we wrapped up our module by giving an overview of the different malware components and distribution channels.
00:49
All right, everyone. So that wraps up our R E preparation module in module to will be investigating the X 64 X 86 architectures
Up Next
Instructed By
Similar Content