Reverse Engineering For Blue Team
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Enroll course
Course sections
Section 1
Starting Course
1
Reverse Engineering For Blue Team – Slide Presentation
2
Reverse Engineering For Blue Team – Course Video
3
Reverse Engineering For Blue Team – Additional Resources
4
Reverse Engineering For Blue Team – Lab 0. Binary Identification
5
Reverse Engineering For Blue Team – Lab 1. Executable Format
6
Reverse Engineering For Blue Team – Lab 2. Strings
7
Reverse Engineering For Blue Team – Lab 3. Packed Executables
8
Reverse Engineering For Blue Team – Lab 4. Disassemble and Decompile
9
Reverse Engineering For Blue Team – Lab 5. Debugging
10
Reverse Engineering For Blue Team – Lab 6. Registry
11
Reverse Engineering For Blue Team – Quiz Exercise
20 questions
12
Reverse Engineering For Blue Team – Course Feedback
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
Starting Course
Online Workshop – Jupyter Notebook for Security Use Case
Lesson is locked. Please Buy course to proceed.
Complete
Questions
My Question