We may earn an affiliate commission when you visit our partners.
Dr. Jared DeMott

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

Read more

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.

Enroll now

What's inside

Syllabus

Course Overview
Using IDA Pro to Reverse Code
Learning x86 and Calling Conventions
Understanding C-to-Assembly and Compiled Structures
Read more
Patching a Compiled Binary
Reversing C++
Extending IDA with Scripts

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Uses the popular IDA Pro debugging tool, which is prevalent in this field
Develops reverse engineering skills, which are sought after in security and programming roles
Taught by experienced and recognized instructors, including Dr. Jared DeMott
Covers x86 assembly and calling conventions, which are essential foundations
Focuses on cybersecurity and malware analysis, which are in high demand in today's tech landscape
Expands understanding of C/C++, which is extensively used in real-world applications

Save this course

Save Security for Hackers and Developers: Reverse Engineering to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security for Hackers and Developers: Reverse Engineering. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security for Hackers and Developers: Reverse Engineering will develop knowledge and skills that may be useful to these careers:
Reverse Engineer
A Reverse Engineer must be adept at a wide array of complex skills, including reverse-engineering software and hardware. This course will allow you to learn the foundational skills that you can build on to develop proficiencies in reverse-engineering.
IT Security Analyst
Security is important for protecting oneself and others from the dangers lurking on the internet, and IT Security Analysts are essential to the process. This course provides a fundamental understanding of the skills used to reverse-engineer malware.
Computer Hacker
Computer Hackers are experts at protecting technology from those attempting to infiltrate or attack it. This course provides expertise in reverse engineering, a skill used to defend against potential exploits.
Malware Analyst
A Malware Analyst needs a strong foundational knowledge of reverse-engineering to examine software and determine its risks.
IT Auditor
IT Auditors examine existing systems for risks and vulnerabilities. This course provides a solid foundation in reverse engineering, a useful skill to have when examining software.
IT Consultant
IT Consultants make recommendations on the best way to implement technology. This course provides fundamental knowledge that will be useful when evaluating the risks of different software.
Software Engineer
Software Engineers work to develop and implement software. This course will be useful for understanding the process of software creation through reverse engineering.
Information Security Analyst
An Information Security Analyst will need to understand reverse engineering to be able to perform security audits and risk assessments.
Cybersecurity Engineer
Cybersecurity Engineers protect computer networks and systems from malicious attacks. This course provides a strong foundation in reverse engineering which is a foundational skill for this role.
Security Engineer
Security Engineers plan and execute security measures to protect organizations and data. This course helps build a foundation in reverse engineering, a critical skill for protecting against threats.
Low-Level Developer
A Low-Level Developer will find this course to be especially helpful as it teaches foundational concepts in reverse engineering, a skill which is required for working with undocumented APIs.
Ethical Hacker
Ethical Hackers use their skills to find vulnerabilities in software and systems. This course provides a solid introduction to the skills used to reverse-engineer software to identify potential exploits.
Database Administrator
Database Administrators may find this course to be helpful for understanding how to protect databases from potential threats.
Network Administrator
Network Administrators will find this course to be helpful for understanding how to protect networks from potential threats.
Security Consultant
Security Consultants will find this course to be helpful for understanding how to assess risks and vulnerabilities in software.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser