Reverse Engineer with Ghidra

Reverse Engineer with Ghidra
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English + subtitle | Duration: 31m | Size: 88 MB
Software reverse engineering and malware analysis are among the most widely sought-after skills in cybersecurity. This course will teach you how to use Ghidra, the industry-standard tool for static analysis, and how malware evades detection.
What you'll learn
In the world of cybersecurity, malware continues to destroy data, soliciting the need for malware analysts and software reverse engineers to step in to help create countermeasures.
In this course, Reverse Engineer with Ghidra, you'll learn the skills needed to dissect binaries using the industry-standard, Ghidra, to understand the behavior and intent of a binary.
First, you'll discover what it means to be a binary, its sections, and how to identify them during the reverse engineering process.
Next, you'll explore the basics of binary helper functions and how to identify them during disassembly.
Finally, you'll learn about packers and reflective code-loading, two common techniques of evasion you will see during your reverse engineering endeavors.
When you're finished with the course, you'll have the foundational skills needed to explore the deep and complex world of software reverse engineering and malware analysis using industry-standard tooling and techniques, allowing you to better understand malware and prepare to create new countermeasures.


RapidGator
NitroFlare
-GETH.rar
UsersDrive
-GETH.rar