Description
Price: 10.00 USD | Size: 5.85 GB | Duration : 7.57 Hours | 85 VideoLessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
IACRB – Certified Reverse Engineering Analyst (CREA)
On this accelerated IACRB Certified Reverse Engineering Analyst (CREA) course, you will gain the skills necessary to become an information assurance professional, widely considered as the most important piece in the information security puzzle.
you’ll be able to demonstrate theoretical knowledge of information assurance, but crucially you’ll also gain valuable practical skills and gain access to a huge network of certified individuals. You’ll also learn:
- The analysis skills needed to reverse engineer and analyse malware
- How malware works, reversing different types of malware
- Commonly used Malware tools
At the end of this course, you’ll sit the IACRB CREA exam, and achieve your IACRB Certified Reverse Engineering Analyst certification. Through Firebrand’s Lecture | Lab | Review methodology, you’ll certify at twice the speed of traditional training and get access to courseware, learn from certified instructors, and train in a distraction-free environment.
Audience
This course is ideal if you are a professional in one of the following roles:
- Malware analysts
- Security researchers
- Cybersecurity professionals looking to gain a technical understanding of malware
- Anyone with a desire to get certified in reverse engineering!
Or if you’re an employer who wants to:
- Establish a baseline skill level requirement for highly technical positions.
- Ensure that individuals have the required hands-on skills to perform on the job. Access to a network of subject matter experts.
1. Introduction to Malware Analysis
1. Flex Types of Malware Analysis
2. Flex Basic Static Analysis
3. Flex Basic Dynamic Analysis
4. Flex Basic Analysis Methodology
5. Flex Automated Malware Analysis
2. Introduction to Reverse Engineering
1. Flex Reverse Engineering Definition
2. Flex Machine Code
3. Flex Assembly Language
4. Flex System and Code Level Reversing
5. Flex Legality of Reverse Engineering
3. Diassembly
1. Flex Assembly Basics
2. Flex Registers
3. Flex Operands
4. Flex Instructions
5. Flex Arithmetic Instructions
6. Flex Logical Instructions
7. Flex Stack Instructions
8. Flex Conditionals and Jump Instructions
4. Reversing Tools
1. Flex IDA (Interactive Disassembler)
2. Flex IDA Alternatives
5. C Code in Assembly
1. Flex Variables
2. Flex If Statements
3. Flex Loops
4. Flex Switch Statements
5. Flex Arrays Structs and Linked Lists
6. Flex Stacks and Heap
6. Windows Internals
1. Flex Windows API
2. Flex Windows Registry
3. Flex Network APIs
4. Flex Processes
5. Flex Threads
6. Flex Services
7. Debugging
1. Flex Debugging Basics
2. Flex Stepping
3. Flex Breakpoints and Exceptions
4. Flex Modifying Execution
5. Flex OllyDbg
6. Flex Debugging with Radare2
7. Flex Kernel Mode Debugging
8. Flex WinDbg
9. Flex Kernel Debugging Example
8. Common Malware Behavior
1. Flex Downloaders and Backdoors
10. Flex SvchostEXE
11. Flex Trojanized System Binaries
12. Flex DLL Load Order Hijacking
13. Flex Goals of Network Analysis
14. Flex Network Functions
15. Flex IP Addresses Protocols and Ports
2. Flex Credential Stealers
3. Flex Process Injection
4. Flex DLL Injection
5. Flex Direct Injection
6. Flex Process Replacement
7. Flex Hook Injection
8. Flex APC Injection
9. Flex Registry Persistence
9. Reversing Rootkits
1. Flex Types of Rootkits
2. Flex SSDT Hooking
3. Flex Interrupts
4. Flex User Mode Rootkits
10. Anti-Disassembly, Anto-Debugging and Anti-Vm
1. Flex Anti-Disassembly
2. Flex Detecting Debuggers
3. Flex Advanced Anti-Debugging Techniques
4. Flex VMware Artifacts
5. Flex Red Pill and No Pill
6. Flex IO Communication Port
7. Flex VMware Detection and Escaping
11. Packed Malware
1. Flex Packed Executables
2. Flex Analyzing Packed Malware
3. Flex Manual Unpacking
4. Flex Popular Packers
12. Obfuscation, Encoding and Encryption
1. Flex Obfuscation Definition
2. Flex Simple Obfuscation Techniques
3. Flex Advanced Obfuscation Techniques
4. Flex Simple Ciphers and Encoding Schemes
5. Flex Base64
6. Flex Common Crypto Algorithms
7. Flex Decoding
8. Flex Ransomware
13. Reversing C++
1. Flex Identifying C Binaries
2. Flex Constructors and Destructors
3. Flex RTTI (Runtime Type Information)
4. Flex Structured Exception Handling
14. Reversing 64-bit Malware
1. Flex 64-bit Architecture
2. Flex 64-bit Analysis
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.