Reverse engineering (Introductory)

This course is for beginners in reverse engineering, from assembly language fundamentals to hands-on malware analysis.
You'll learn how to use a debugger and even build an automated analysis system.

Contact us on +82-2-2671-3344

Training guidance

Reverse engineering (Introductory)
  • Training Schedule
  • Discussion
  • Training Place
  • Discussion
  • Training hours
  • 09:30 ~ 17:30 (35 hours | 5 days)
  • Rating
  • Education Costs
  • -
  • Capacity
  • 5 to 10 people
  • Note
  • Lecture materials, lunch, certificate provided upon 80% attendance
  • Contact
  • +82-2-2671-3344

Educational purposes

This course is designed for beginners in reverse engineering, starting from the basics of assembly and going through malware analysis theory and practical training to understand the operating principles of malware. It aims to systematically learn how to prevent, diagnose, and respond to cyber attacks by learning techniques to detect and analyze actual malware using analysis tools used in the field.

Training Target

  • Those interested in reverse engineering

  • Those who want to experience malware analysis

  • Those who want to pursue a career as an information security expert

Training schedule and content

Day 1

Malware attack methods and breach response
  • Understanding Malware Attack Methods
  • Malware Overview, Characteristics, and Behavior Analysis
  • APT Attack Understanding and Breach Cases
  • Malware Overview, Breach Incident Response
  • Incident Response Procedure
    • Key Process Analysis
    • Key Registry and Network Analysis
  • Scenario-based detection & analysis
    • Malicious Code Scenario Detection and Analysis (1)
    • Malicious Code Scenario Detection and Analysis (2)

Day 2

Malware Attack Analysis Practice
  • Malware Analysis Practice
  • Practical training on responding to attacks using malware
    • Malware attack response practice simulation training using content
    • Understanding the impact of malware on networks and systems
    • Distinguishing between malware and general code and responding
  • Browsing Analysis
    • Analysis Practice Using FTK Imager
  • Recovering Analysis
  • Timeline Analysis
    • Artifact Analysis with Time Information
    • File System Timeline Analysis
    • Memory Timeline Analysis
  • OS Log Analysis
    • Application Event Analysis, Security Events
    • Analysis, System Event Analysis
    • Registry Analysis and System Process Analysis

Day 3

Malware Attack Response
  • Reverse Engineering Fundamentals
  • Analysis of 16-bit malware
  • Introduction to reverse engineering analysis tools
  • Practice with assembly language commands through tools
  • Practice in analyzing malware through debugging
  • Analysis of 16-bit malware
  • Analysis of Mini60 16-bit malware

Day 4

Reverse engineering labs
  • Understanding Windows Programming (2)
  • Types of PE Files
  • Imunity Debugger
  • Immunity Debugger Overview
  • CreakMe Labs
  • 3.4 Practice Decrypting the DDoS Sample
  • IDA Pro
  • IDA Pro Overview and Setup
  • Decompilation Features in IDA Pro: Hex-Rays
  • Using IDAPython
  • Virus Genome Maps
  • IDA Pro Lab: MS08-021
  • IDA Pro Lab: MS08-052

Day 5

Reverse engineering labs
  • Anti-Virus Analysis
  • Anti-Virus Detection Techniques
  • Anti-Virus Evasion Techniques
  • Commercial anti-virus analysis