Wednesday, November 11, 2009

Reverse Engineering Course - InfoSec Institute

When browsing through Reverse Engineering courses, I found the following course in the InfoSec Institute. Check it out! The following is copied and pasted from InfoSec Institute course page:

Reverse Engineering Training

Reverse Engineering: Malware, Binary Analysis and Software Vulnerabilities

Reverse engineering is a vitally important skill for today's expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today's ever evolving threats.

In this 5 day hands-on course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. You will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:

* Hostile Code & Malware, including: Worms, Viruses, Trojans, Rootkits and Bots.
* Vulnerabilities in Binaries, including: Format string vulnerabilities, buffer overflow conditions, and the identification of flawed cryptographic schemes
* Binary obfuscation schemes, used by: Hackers, Trojan writers and copy protection algorithms

Additionally you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET.

InfoSec Institute will train you on the standard reverse engineering programs IDA Pro, Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.


Reverse Engineering is a critical skill.
Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering.

Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them.

Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.

Learn from Experts in the field of Reverse Engineering:
All of the instructors for InfoSec Institute's Reverse Engineering course active work in the field of incident response or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.

Learn reverse engineering in our hands-on classroom labs:
Some of the reverse engineering concepts you will learn to master during this course...

* Understanding conditional branching statements
* Virtual machines and bytecode
* System vs. Code Level reversing
* Identifying variables
* Compilers and branch prediction
* Memory management
* Win32 executable formats and image sections
* Fundamentals of IDA Pro
* Advanced uses of IDA Pro with hostile code
* Using Ollydbg for runtime analysis of malware
* Kernel mode debugging with SoftICE
* Dumping executables from memory with Dumpbin
* Locating undocumented APIs
* Reversing ntdll.dll
* Obfuscation of file formats



* Understanding hashing functions
* Working with encrypted binaries
* Reversing UPX and other compression types
* Discovering stack overflows
* Discovering heap overflows
* Creating a sandbox to isolate malware
* Unpacking malware
* Monitoring registry changes
* Identifying malware communication channels
* Understanding Digital Rights Management (DRM) implementations
* Thwarting anti-debugger code
* Debugging multi-threaded programs
* Recursive traversal dissasemblers
* Reversing .NET bytecode
* CREA Review
* Legal issues and the DMCA

Certified Reverse Engineering Analyst:
In any hands on reverse engineer training course, it is important to have the opportunity to prove to current or potential employers that you have the skills you say you do. This course prepares you for the top reverse engineering certification in the industry, the CREA. The exam is given on-site, InfoSec Institute has achieved a 93% pass rate for this certification.

How You Benefit:

* Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field.
* Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.
* Move beyond automated "input and output" testing of binaries, commonly used by fuzzers and other analysis tools.
* More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

What's Included:

* 5 Days of Expert Reverse Engineering Instruction from a senior instructor with real-world experience and deep knowledge of course content.
* Guaranteed small class size (less than 10-16 Students), you get an intimate learning setting not offered at any of our competitors.
* InfoSec Institute's Custom Reversing Tools Enterprise Suite, includes every program covered in the course for at home study. (119 Tools).
* All meals, snacks and refreshments included.
* Certified Reverse Engineering Analyst (CREA) exam fees.
* Lecture, Lab Exercise and Text book

Required Prerequisites:

* Firm understanding of the Windows Operating System
* Firm understanding of computer architecture concepts
* Grasp of the TCP/IP protocols

If you are unsure if you meet the required prerequisites, contact us for a quick network security training skill check.


Thank you for checking out the stuff. Kindly, give your honest review in COMMENTS.

- EF

No comments: