Best Reverse Engineering Courses

Find the best online Reverse Engineering Courses for you. The courses are sorted based on popularity and user ratings. We do not allow paid placements in any of our rankings. We also have a separate page listing only the Free Reverse Engineering Courses.

Reverse Engineering, Debugging and Malware Analysis – 2021

Learn Reverse Engineering, Debugging and Malware Analysis Fundamentals by lots of Practical Examples Reverse Engineering

Created by TechBinz Academy - Instructor, IT Trainer, Automotive Engineer, Programmer

"]

Students: 94706, Price: $89.99

Students: 94706, Price:  Paid

*Printable online certificate available upon completion of course*

Breaking something down and putting it back together is a process that helps people understand how things were made.

A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work requires understanding each major and minor mechanical part and their purposes. The complex nature of the human anatomy requires people to understand each and every part of the body. How? By dissecting it. Reverse engineering is a way for us to understand how things were designed, why is it in its state, when it triggers, how it works, and what its purpose is. In effect, the information is used to redesign and improve for better performance and cost. It can even help fix defects.

Imagine if the Trojan Horse was thoroughly inspected and torn down before it was allowed to enter the gates of a city. This would probably cause a few dead soldiers outside the gate fighting for the city. The next time the city is sent another Trojan Horse, archers would know where to point their arrows. And no dead soldiers this time. The same is true for malware analysis—by knowing the behaviors of a certain malware through reverse engineering, the analyst can recommend various safeguards for the network. Think of it as the Trojan Horse being the malware, the analyst being the soldier who initially inspected the horse, and the city being the network of computers.

Anyone seeking to become a reverse engineer or an analyst should have the trait of being resourceful. Searching the internet is part of reverse engineering. An analyst would not plainly rely on the tools and information we provide in this udemy course. There are instances that an analysis would even require reverse engineer to develop their own tools. Software auditing may require reverse engineering. Besides high-level code review processes, some software quality verification also involves implementing reverse engineering. The aim of these test activities is to ensure that vulnerabilities are found and fixed. There are a lot of factors that are not taken into consideration during the design and development of a piece of software. Most of these are random input and external factors that may cause leaks, leading to vulnerabilities. These vulnerabilities may be used for malicious intents that not only disrupt the software, but may cause damage and compromise the system environment it is installed in. System monitoring and fuzzing tools are commonly used when testing software. Today's operating systems have better safeguards to protect from crashing. Operating systems usually report any discrepancies found, such as memory or file corruption. Additional information, such as crash dumps, are also provided in this course. From this information, a reverse engineer would be able to pinpoint where exactly in the software they have to inspect.

In the software security industry, one of the core skills required is reverse engineering. Every attack, usually in the form of malware, is reversed and analyzed. The first thing that is usually needed is to clean the network and systems from being compromised. An analyst determines how the malware installed itself and became persistent. Then, they develop steps for uninstalling the malware. In the anti-malware phase, these steps are used to develop the clean-up routine, once the anti-malware product is able to detect that the system has been compromised. The analysis provides information about how the malware was able to compromise the system. With this information, network administrators are able to impose policies to mitigate the attack. If the malware was able to enter the system because of a user opening an email attachment that contains JavaScript code, the network administrator would implement the blocking of emails that contain a JavaScript attachment.

Learn Ethical Hacking & Reverse Engineering

Fun way to learn Ethical Hacking & Reverse Engineering by hacking real practice websites & reversing CrackMe's

Created by Paul Chin - College lecturer

"]

Students: 46351, Price: $39.99

Students: 46351, Price:  Paid

If you want to learn ethical hacking  & also reverse engineering the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack  and also to reverse software. These websites typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn hacking and reversing.  All you need is a PC. In this course I am only using a Windows PC to do ethical hacking and reverse engineering.

The website we will be hacking is DefendTheWeb which is a popular hacker's playground where hackers play hacking games reminiscent of CTF (Capture the Flag) and learn at the same time. However, without some help and guidance you will find it quite challenging. Hence this course. I will walk through each level from Basic to Realistic. 

For the Reverse Engineering lessons, you will  learn how to reverse CrackMe's.   A CrackMe is a small program designed to test a programmer's reverse engineering skills.

These CrackMe's typically have different levels from easy to advanced. By solving each level and gradually levelling up, you will learn reverse engineering (reversing).  Traditionally, reverse engineering is taught by first learning C/C++, assembly language and then debugging. Note that we do not crack software nor condone the act of cracking software.

The crackme's we will be reversing is provided by CrackingLessons and Crackmes One which are a popular reverser's playground . Information on solving crackmes on the Internet is terse and unstructured. Hence this course. I will walk through each level just like in a classroom where you can follow along and ask questions in the Q & A section. All you need is a PC running Windows.

Great way to learn Web Development, Information Technology (IT), Assembly programming and Reverse Engineering:

If you had always wanted to learn HTML, Javascript, PHP, MySQL, etc, Assembly and Reverse Engineering, what better way than to learn how to hack websites ethically and reverse engineering. .  This course is also a great stepping stone to other Reverse Engineering fields like malware analysis, exploits development and software testing.   So let's get started in your journey of hacking & cracking to learn.

This course is backed by a 30-day money back guarantee.  So, go ahead and enroll in this course now and start hacking the fun and easy way!

Mobile Security: Reverse Engineer Android Apps From Scratch

Learn Android reverse engineering in less than 4 hours

Created by Flip Cortex - Provider of ethical hacking and cyber security trainings

"]

Students: 33782, Price: $69.99

Students: 33782, Price:  Paid

This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security.

In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals.

This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general.

The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs.

Course outline:

-Course Requirements

-Intro to Android

-Course/Lab Setup

-Developing a Basic Android App

-Analyzing Android Apps

-Case Study: Analyzing an actual ransomware and developing a decryption tool

Reverse Engineering and Memory Hacking with Cheat Engine

Learn how to reverse engineer and hack the memory of programs running on Windows

Created by Paul Chin - College lecturer

"]

Students: 25220, Price: $29.99

Students: 25220, Price:  Paid

If you had always wanted to learn how use hack a program's memory, to reverse engineer and debug software, then this is the course for you.This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. Traditionally, we use tools like x64dbg, OllyDbg for reverse engineering and debugging. Howevever, those tools have their limitations as they rely on file patching to modify program behaviour. But what if the files could not be patched. Here Cheat Engine shines. Cheat Engine is a memory hacking tool. It is used by Gamers to hack games in order to cheat. Cheat Engine's main strength is its memory scanning, code injection, or process patching. This course will equip you with the knowledge and skill to use Cheat Engine in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.

In this course we will learn Cheat Engine by hacking CrackMe challenges.  A CrackMe is a small program designed to test a programmer's reverse engineering skills.

What you will learn

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching process memory

  • Locating address to do memory patching

  • Writing custom Memory Hackers (trainers) using Cheat Engine to hack and patch memory

  • Creating Lua Scripts for process patching

  • Break and Trace

  • Cone Injection

  • Direct Memory Patching

  • and more...

Prerequisites:

  • Knowledge of Assembly would be helpful but not compulsory

  • Windows PC

Reverse Engineering 1: x64dbg Debugger for Beginners

Learn how to reverse engineer and debug programs with x64dbg in 1 hour

Created by Paul Chin - College lecturer

"]

Students: 24117, Price: $19.99

Students: 24117, Price:  Paid

If you had always wanted to learn how use x64dbg to reverse engineer and debug software, then this is the course for you.

x64dbg is one of the most popular modern debugger in use today and has superseded OllyDbg.  It is used for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn x64dbg by solving a simple CrackMe challenge.  A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. This course will equip you with the knowledge and skill to use x64dbg in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

Money back guarantee:

This course is backed by a 30-day money back guarantee.  So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! 

Game Hacking: Cheat Engine Game Hacking Basics

Introduction to reverse engineering and memory hacking using Cheat Engine

Created by Paul Chin - College lecturer

"]

Students: 19662, Price: $19.99

Students: 19662, Price:  Paid

If you like playing games or reverse engineering, then this course is for you.

Traditionally, reverse engineering has been done using familiar tools such as x64dbg, OllyDbg and IDA. This course will introduce you to another powerful tool commonly used in game hacking - called Cheat Engine (CE).  This tool will allow you to modify in-game Health, Ammo, Position and more.

Although youtube has plenty of tuts on Cheat Engine, they typically lack beginner-friendly explanation and personal guidance. In this course, I will take you by the hand as a complete beginner to become familiar with what is game hacking and reverse engineering. You will learn the difference between memory values vs. pointers, data structures, how to scan memory to tamper with it to become invincible plus have unlimited ammo, create Cheat Tables (shareable hacks), pointer scanning, writing scripts to inject code into process memory and more...

By the end of this course, you should be able to apply your basic skills to hack an open source free game called Assault Cube - a 3D First Person Shooter (FPS) game. I have chosen this game because, it can be used as a standalone game - where you play against bots - and also because the game is totally free  and open source - and is the standard game to use when first learning game hacking.

Difference between memory hacking and file patching.

In traditional reverse engineering, after we have managed to reverse it, we would patch the program file. However, not all programs can be patched, eg, packed programs cannot be patched. Here, Cheat Engine shines. Cheat Engine does not rely on patching programs, its main strength lies in memory hacking (process hacking). In Cheat Engine, we allow the program to be loaded into RAM memory first, then we hack it there. This course introduces you to the basics of Cheat Engine - so that you will be familiar with memory hacking using Cheat Engine.

Throughout this course, I will be there for you - to answer all your questions and to guide and mentor you in game hacking and reverse engineering. Thank you and see you inside.

Reverse Engineering 4: Software Protection

Learn how software protection works from the inside out using the x64dbg debugger

Created by Paul Chin - College lecturer

"]

Students: 19522, Price: $19.99

Students: 19522, Price:  Paid

If you had always wanted to learn how software protection works and how to use x64dbg to unpack them,  then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.

You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging.  A CrackMe is a small program designed to test a programmer's reverse engineering skills.

What you will learn

  • How to set hardware breakpoints and analyze the unpacking header stub

  • Dumping unpacked executable from memory

  • Fixing Import Address Tables (IAT) after dumping memory.

  • Modify program behaviour

  • Patching programs

  • Creating loaders for process patching

  • What if the program cannot be unpacked

  • 3 techniques to unpack multiple protections

Prerequisites:

Before taking this course, you should already be familiar with how to use x64dbg.

Money back guarantee:

This course is backed by a 30-day money back guarantee.  So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! 

Reverse Engineering: Ghidra For Beginners

Learn Reverse Engineering Using Ghidra On Linux And Windows

Created by Paul Chin - College lecturer

"]

Students: 19151, Price: $39.99

Students: 19151, Price:  Paid

If you have never used Ghidra before and want to learn how get started with using Ghidra to reverse engineer and analyse programs, then this is the course for you.

Ghidra is the strong competitor to IDA Pro and is used by NSA itself for Reverse Engineering. And the best thing is that it is totally free. It is used for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn Ghidra by solving  Linux  and Windows CrackMe challenges.  A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to understand how Linux  and Windows binaries work. This course will equip you with the knowledge and skill to use Ghidra in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.

I will start off with showing you how to install Oracle Virtual Box. Then, installing Java SDK and Kali Linux in the Virtual Box. Then, we will reverse engineer Linux executable files.

Next, we will move on to installing Java SDK and Ghidra for Windows and reverse and analyze Windows programs. You will also learn how to reverse GUI CrackMe's. You will learn how to use Function Graphs, Function Call Trees, Search String, Defined Strings and more. The course will also cover how to identify program entry point and also find the main functions for command line interface apps and WinMain for GUI based apps.

By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries.

What you will learn:

  • How to disassemble programs into assembly code

  • How to decompile programs to C code

  • Static Analysis

  • Understand Windows API's

  • Identify entry points, main and WinMain functions

  • Use String Search and Defined Strings

  • Visualizing the Call Stack using Function Graph and Function Call Trees

  • Solving Crackmes

  • and more ...

Suitable for:

Anyone interested to learn Reverse Engineering on Linux and Windows executable files.

Practical Internet of Things Hacking – 2021

Conducting Reverse Engineering on Internet of Things Firmware for Fun and Profit

Created by Haitham Alani - Assistant Professor

"]

Students: 16659, Price: $19.99

Students: 16659, Price:  Paid

Welcome to Practical Internet of Things Hacking - 2021

Nowadays almost, every device has Internet access. IoT promises to bring supply chain efficiency, decreased maintenance downtime, home conveniences, and much more. There’s a lot of power being bestowed upon these little guys. And with great power… comes great vulnerabilities. Every IoT device no matter large or small it is, needs an operating environment. In the IoT world of embedded systems, that’s called firmware. But what is it, how do we hack it and what are the impacts for your home, in your organization and on your careers? We’re very excited to bring you a mini course of its kind that will takes you into a unique journey of extracting, reversing and exploiting the Firmware of Internet of Things. This course is ideal for penetration testers, security enthusiasts and network administrators.

The following materials will be covered in this course:

  • Introduction to Internet of Things (IoT).

  • Installing AttifyOS the de-facto operating system for Internet of Things penetration testing.

  • Learn how to extract and explore IoT firmware.

  • Learn how to find vulnerabilities in a specific IoT firmware.

  • Learn how to practically backdoor a specific IoT firmware.

  • Learn how to manually detect backdoors in IoT firmware.

  • Learn how to perform dictionary attack against IoT control panel login forms.

  • Learn how to emulate Firmware devices without the need to purchase or brick an IoT device.

  • No prior knowledge is needed!

    It doesn't need any prior knowledge to learn IoT hacking however, a basic Linux skills will be like putting a cherry on the top of the cake :)

  • This course starts with very basics. First, you will learn how to install the tools, some terminology. Then the show will start and you will learn everything with hands-on practices.

  • Free and popular tools are used you don’t need to buy any tool or software.

  • You'll also get:

    Lifetime Access to The Course.

    Fast & Friendly Support in the Q&A section.

    Udemy Certificate of Completion Ready for Download.

    24/7 support, so if you have any questions you can post them in the Q&A section or DM me and I will make sure to get back to you ASAP.

Very Important Note:

The word hacking in the course implies performing Ethical penetration testing against your own devices or the devices that you already obtained a written permission from their administrators or owners.

Reverse Engineering and Malware Analysis Fundamentals

Beginners' course on reverse engineering and malware analysis

Created by Paul Chin - College lecturer

"]

Students: 16160, Price: $59.99

Students: 16160, Price:  Paid

If you are completely new to reverse engineering and malware analysis, then this course is for you. I will take you from zero to proficient level in reverse engineering and analyzing malware. You will learn using plenty of practical walk-throughs. We will learn the basics first then gradually proceed to more advanced topics. All the needed tools will be introduced and explained. By the end of this course, you will have the fundamentals of malware analysis under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained in reverse engineering and analysis would be beneficial to you to reverse software as well.

Everything is highly practical.  No boring theory or lectures. More like walk-throughs which you can replicate and follow along.  We will use tools like tridnet, bintext, pestudio, cff explorer, regshot, procdot, fakenet, wireshark, process monitor, process hacker, xdbg, Ghidra and more...

Topics include:

  1. Lab Setup

  2. Tools

  3. OS Fundamentals

  4. Virtual Memory and the PE file

  5. Windows Internals

  6. Malware Components

  7. Static analysis

  8. Dynamic Analysis

  9. Network Analysis

  10. Unpacking Standard and Custom packers

  11. Dumping memory

    and more...

This course is suitable for:

  • Anyone who has no background on malware analysis and just starting out in this field

  • Hobbyist who just like to learn how to reverse engineer and analyze malware

  • Students who like to get started on the career path to become malware analysts

  • Hackers looking for additional tools and techniques to reverse software

The prerequisites:

Just a windows PC and an interest in malware analysis, or software reverse engineering.

Enroll now and I will see you inside.

Reverse Engineering 2: Windows GUI Programs

Reverse engineer Windows Graphical User Interface programs with xdbg

Created by Paul Chin - College lecturer

"]

Students: 15121, Price: $19.99

Students: 15121, Price:  Paid

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Understanding Trial Period software

  • Understanding Software Registration process

Thank you and see you inside.

Mastering Thinking Skills Vol 2: Become a Creative Genius

Reverse Engineering the mental frameworks that geniuses from Jobs to Da Vinci used to dominate their fields.

Created by Timothy Kenny - Author of "Accelerated Learning for Entrepreneurs"

"]

Students: 14836, Price: $19.99

Students: 14836, Price:  Paid

Why Take This Course on Creative Genius?

Hey,

I know...You must be thinking.

What is so special about this course?

It's tough to evaluate any course like this because creativity is a "Meta-Skill," meaning it is enormously powerful...

but very difficult to measure and track progress.

I've spent over 5 years, hundreds of dollars and thousands of hours of my own time poring through dozens of the best books and courses out there on creativity.

And I felt the same way you probably feel afterwords...unsatisfied.

Why?

Because the products currently on the market fit into these two categories:

  1. Books and courses that tell you what a genius did, but not how they did it. Stories instead of strategies.

  2. Books and courses where a "creativity expert" projects their pet creativity strategies onto their favorite geniuses. Projections instead of deconstruction.

Sure, stories are great. And almost any creativity strategies "works" in the sense that you will get some marginal, indeterminate "bump" in your creativity. But neither of these types of books or courses give you what you really need.

A blueprint for creating the same kind of complete mental system that geniuses use to create their masterpieces.

What does that mean?

In 1956, President Eisenhower signed into law the bill that created the interstate highway system in the United States. (If you are from Europe, think of the railroad system built in the 1800s) These 6 and 8 lane highways replaced the smaller and ill-kept roads that connected the country up until that point.

The new highways increased trade massively and opened up the country to the full benefits of the industrial age.

Cultural trends started passing across the country on interstate paths like Route 66.

The interstate system also served the critical military purpose of evacuating millions of people quickly from cities in the event of an atomic bomb.

Eisenhower's vision took a vast but under-connected group of 48 states and turned it into a more unified country.

Similar effects have resulted from the expansion of the telephone and internet. Each innovation massively improved the interconnectedness, productivity and creativity of the United States.

Countries (and even continents, especially Africa) struggle economically and fail to produce creative geniuses because they lack this basic infrastructure that underpins all creative and productive efforts.

So what?

Well, it turn’s out that your brain is really just a big network of neurons connected to each other.

Each time you think a thought, the connection between the neurons your brain just fired get “myelinated.”

Your “Train of Thought” rides along a path of neurons every time you think a thought. Mylin, an insulator made of fat, wraps around that path of neurons (just like rubber around a USB cable) and makes that train of thought go faster next time you think the same thought.

Geniuses have found a way to hack this natural process.

Most of us never intentionally try to connect the different areas of our brain, the different “neural nets” that represent our different areas of interest or expertise.

But these connections are the most important part of creativity.

And the difference between a genius brain and an average brain is how it’s wired.

A genius has built (often unintentionally) the equivalent of an “interstate highways system” between their different areas of expertise.

This system allows them to “trade” thoughts between different domains of knowledge to generate creative breakthroughs.

Remember how Steve Jobs credited his calligraphy class to his knack for intuitive design?

He couldn’t have done what he did without this sort of “creative interstate system” running 24/7 in his brain, allowing it to generate one blockbuster, industry transforming product after another.

The first half of the course will take you through building this system in your brain. The second half will show you how to maximize your use of your new “creative interstate system” once you have built it.

Click Here to Begin the Course

See you on the other side,

Timothy

Description from the Back of the Box

The biggest lie about Genius is that genius is inborn. IQ is inborn. Genius is the combination of IQ and other factors. The truth is, many geniuses were only slightly above average in terms of IQ (Richard Feynman, widely regarded as the last American genius, had an IQ of only 122)… it is their thinking strategies that made them exceptional.

The other big lie about genius is that it only relates to intellectual performance. The truth is that there are 9 intelligence types, and a genius is someone who excels in any one of those areas. But because western culture values intellectual performance above all others, our collective view of genius is skewed. In fact, the root word of genius comes from Greek. Genius originally meant the potential within any person that, if cultivated, would make them exceptional in what they were born to do.

This course is only meant for people who believe the secret to talent is 80% strategy and 20% genetics, not the other way around. Ideally you have already read my book and taken some of my other courses, because I will only be covering advanced ideas in this class.

The key difference between this class and other books and courses on genius is that you will not just learn the stories of geniuses and what they did, but how to actually apply the strategies and build the frameworks in your own head so that they are useable and you actually feel and see yourself getting smarter and more creative.

The patterns of Genius we will cover:

Geniuses look at problems from multiple perspectives

Geniuses think in images so that they can see systems, hierarchies, and larger patterns

Geniuses master the language of metaphor, which allows them to see patterns nobody else sees

Geniuses live in the flow and have the ability to remove distractions and focus

What you will learn:

  1. How multiple intelligences work, which ones are your strengths and how to develop the other areas in key areas for the highest short term payoff

  2. How to install many different perspectives into your brain quickly. This is not just lateral thinking.

  3. How to think in systems so you see everything from a birds eye view by using visual mapping for all your ideas

  4. How to download a ton of the most common metaphors into your head so that you start seeing them everywhere

  5. How to set up your life and your workspace so you can consistently get into the flow and stay there

  6. Why vertical and lateral thinking is not enough if you want to unlock your genius potential, and what to do to get there

  7. 4 non-thinking habits of geniuses that you can instantly incorporate into your daily routine and work habits

  8. How to see the genius in everyone you meet and how to foster the latent genius in your children

  9. The epic genius battle stories between Thomas Edison and Nikola Tesla and how to incorporate their different approaches/flavors of genius into your own thinking

Reverse Engineering: IDA For Beginners

Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows

Created by Paul Chin - College lecturer

"]

Students: 12455, Price: $39.99

Students: 12455, Price:  Paid

If you are a beginner to Reverse Engineering and want to learn how to use IDA Pro to reverse engineer and analyze Linux and Windows programs, then this is the course for you. In this course, you will a CTF (Capture The Flag) game -for Linux whilst learning reverse engineering. This makes learning fun and exciting.This will teach you all the basic skills for reversing on IDA, eg, how to rename labels, insert comments, convert data, create functions and analyze assembly code. We will use the Free version of IDA so that anyone can follow along without spending money to buy the Pro version. After that we will move to Windows and Reverse Engineer five Windows Crackme's.

IDA Pro is one of the most widely used Disassembler for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn IDA by solving  Linux  and  windows CrackMe.  A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally. This course will equip you with the knowledge and skill to use IDA in addition to whatever other tools you might already be familiar with. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.

I will start off with showing you how to install Oracle Virtual Box. Then, installing Remnux Linux in the Virtual Box followed by IDA for Linux. Then, we will reverse engineer Linux executable files. In a later section, we will move to installing IDA on Windows and continue learning how to reverse engineer windows files using IDA.

By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries using IDA.

What you will learn:

  • How to disassemble programs into assembly code

  • How to decompile programs to C code

  • Static Analysis

  • Dynamic Analysis using IDA's Debugger

  • Patch files using IDA

  • Understand Linux and Windows API's

  • Identify entry points and functions

  • Using NOPs and Reversing Jumps

  • Reverse Crackmes and Patch them

  • Learn to Assemble Instructions and Patch Bytes

  • Algorithm Analysis and Testing

  • Using Python to create solutions and keygens to crackmes

  • and more

Suitable for:

  • Anyone interested to learn to use IDA for Reverse Engineering Linux  and Windows executable files.

  • Students thinking of getting into Reverse Engineering or Malware Analysis as a Career Path

Prerequisite:

  • Assembly Language, C Programming and Python would be helpful

  • Windows PC

  • Basic Linux Commands

Reverse Engineering: Create Your Own GUI CrackMe using C++

The fun way to learn how to build windows GUI programs by creating your own crackme's for reverse engineering

Created by Paul Chin - College lecturer

"]

Students: 12443, Price: $39.99

Students: 12443, Price:  Paid

If you want to get started quickly on building rich gui-based crackmes using drag and drop method the easy way, then this course is for you. You will learn how to use Embarcadero C++ Builder (Free Community Edition) to create form-based apps much like Visual Basic, where you drag and drop buttons, input boxes, labels etc onto forms. A CrackMe is a small program designed to test a programmer's reverse engineering skills.

You will also learn C++ programming. After learning the basic skills taught in this course, you will be able to create any type of crackme you can imagine.  Publish them on crackmes websites or share with your friends, or, put up on youtube, etc. Your limit is your imagination!

This course is also ideal for Software Developers who want to learn how to protect their software from being reversed. They can rapidly create crackmes to test out new ideas and if it works implement the ideas in their real software. The CrackMe's you build are compiled into native exe files and are suitable for practising reverse engineering using x64dbg or any windows reversing tools you prefer.

This course covers:

  1. Installing C++ Builder

  2. Building Form Based Apps

  3. Using Forms, Labels and Buttons

  4. Using Edits boxes and Message Boxes

  5. Use Strings and Integers

  6. Build crackme's

  7. Simulate serial keys licensing

  8. Simulate trial expiration

  9. Simulate functionality limits

  10. Simulate time

  11. Simulate server activation

  12. Understanding Trial Period software

  13. Understanding Software Registration process

  14. C++ Programming

  15. Build standalone programs

  16. Using Forms, Buttons, Textboxes, MessageBoxes

  17. Creating Auto-generating Serial CrackMe's

  18. Nag screens CrackMe's

  19. Implementing Anti-Debugger Protection

  20. Build a Client-Server Activation System CrackMe

  21. and more...

Who this course is for:

  1. Anyone interested to create their own crackme's for practising Reverse Engineering or CTF (Capture The Flag) Challenges

  2. Programmers who want to get started in Reverse Engineering but do not have any targets to practice on

  3. Students who want to learn C++ Programming the fun way

  4. Software developers who want to learn how to protect their software

Full source code is provided with each lesson. You can download them or build from scratch by following the lessons.

What better way to get started in C++ and also creating your own windows form-based programs the easy and fun way!

Enroll today and I'll see you inside.

Reverse Engineering & Malware Analysis of .NET & Java

A Beginner's Course on Reverse Engineering and Analyzing Malicious .NET and Java Executable Files

Created by Paul Chin - College lecturer

"]

Students: 12111, Price: $39.99

Students: 12111, Price:  Paid

New malware are being created everyday and poses one of the greatest threat to computer systems everywhere. In order to infect Windows, Linux and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware - one of the most common and popular ways to create cross platform malware. If you are a beginner just starting out on malware analysis and wish to gain a fundamental knowledge to analyze .NET or Java malware, then this course is for you. It is a beginner course which introduces you to the technique and tools used to reverse engineer and also analyze .NET and Java binaries.

In this course, you will learn how to check and analyze malicious .NET and Java executables for signs of malicious artifacts and indicators of compromise. This is a beginners course and targeted to those who are absolutely new to this field. I will take you from zero to proficient level in analyzing malicious .NET and Java binaries. You will learn using plenty of practical walk-throughs. We will learn the basic knowledge and skills in reverse engineering and analyzing malware. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of .NET and Java under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check executables for dangers and protect yourself from these attacks.

We will use Flare-VM and windows virtual machine. Flare-VM is a popular Windows based Malware Analyst distribution that contains all the necessary tools for malware analysis. All the essential theory will be covered but kept to the minimum. The emphasis is on practicals and lab exercises.

Go ahead and enroll now and I will see you inside.

Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals

Created by Infinite Skills - High Quality Training

"]

Students: 10866, Price: $49.99

Students: 10866, Price:  Paid

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Reverse Engineering 3: x64dbg Graphical Static Analysis

Introduction to using x64dbg to reverse engineer programs using graphical static analysis

Created by Paul Chin - College lecturer

"]

Students: 7173, Price: $19.99

Students: 7173, Price:  Paid

If you had always wanted to learn how  to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg however can do it. It can disassemble a program and also represent it as a graphical representation.  This makes it ideal as a free tool to perform what IDA Pro can do - i.e. static analysis.

Unfortunately, there is not much information on the Internet on how to use x64dbg to do static analysis, hence this course.  You can use its powerful graphical tool for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn  how to disassemble a program and represent it an a graphical view so as to be able to easily analyse and understand how the program works - and also to patch programs. The hidden power of x64dbg lies in its ability to run a live debugging session simultaneously with graphical static analysis. And I will show you how to do it in this course.

What you will learn:

  • How to disassemble programs into assembly code and show it in a graphical representation

  • Graphical Static Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Reversing jumps

  • Changing register values

  • Patching programs

Money back guarantee:

This course is backed by a 30-day money back guarantee.  So, go ahead and enroll in this course now and start reverse engineering programs the fun and easy way using graphical static analysis! 

Reverse Engineering Ransomware

Static and dynamic analysis. Reverse engineering. Writing Decryptors

Created by Cristina Gheorghisan - Trainer and Coach

"]

Students: 5226, Price: $24.99

Students: 5226, Price:  Paid

The aim of this course is to provide a practical approach to analyzing ransomware. Working with real world samples of increasing difficulty, we will:

Deep dive into identifying the encryption techniques,

Navigate through various evasion tricks used by malware writers,

Have fun discovering flaws in their logic or the implementation and

Work out automated ways to recover the affected files.

If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualisation and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms,  please check out our Advanced Reverse Engineering Ransomware course!

Expert Malware Analysis and Reverse Engineering

Beginner to Expert series on Malware analysis and reverse engineering concepts.

Created by Abhinav singh - Security researcher

"]

Students: 4075, Price: $29.99

Students: 4075, Price:  Paid

Malware analysis is a critical skill in the information security community. This course is logically designed to help you leap through the complicated steps of static and dynamic malware analysis in an easy and proactive way. After this course, you will be able to understand the core skills required in malware incident response investigations and analysis of Advance persistent threats. The course will guide you trough the basic requirements and necessary skillsets required in order to take your knowledge to the next level. 

Some of the key take a-ways from this course are:

  • Over 4 hours of content purely focused on key skills required for effective analysis of web threats.
  • Fully interactive and community driven course.
  • Static and Dynamic malware analysis and its various steps.
  • File format analysis of standard formats like PDF, Flash, Word, Excel etc.
  • Understanding the Cyber kill chain and how it applies to malware attack life cycle.
  • Deep understanding of relevant tools that can help in uncovering complex malware traits.
  • Basics of Reverse Engineering and how we can analyze advance malware behavior using it.
  • Incidence response and report generation skills for information security professionals.

You can post your queries and doubts in the course and I will be more than happy to help you in your learning curve. 

Ethical Hacking & Bug Hunting: Buffer Overflow For Beginners

Learn how to exploit Buffer Overflows on Windows systems. Get a shell! (Reverse engineering and Exploit development).

Created by Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing) - Hacking, Ethical Hacking, Bug Bounty and Penetration Testing

"]

Students: 1376, Price: $109.99

Students: 1376, Price:  Paid

The primary goal of this course is to provide you with practical exposure to the world of bug hunting. After taking this course, you will have a better understanding of the approaches (reverse engineering, exploit development) that bug hunters use to find security vulnerabilities. You will learn how to exploit Buffer Overflows on Windows systems. This is an initial course and begins from the very basics of exploitation and is beginner-friendly.

The difficulty is that most IT professionals do not have the general software development background required to begin the subject of buffer overflow. This course cuts down the technical subjects of computer memory management, controlling code, and data inside of a working program, and exploiting poor quality software into terms that IT people with no software development knowledge can understand.

A buffer overflow is a popular software coding error that an intruder could use to take control over your system. To efficiently decrease buffer overflow vulnerabilities, it is necessary to understand what buffer overflows are, what threats they act to your applications, and what methods attackers use to successfully exploit these vulnerabilities.

In this course, you will learn how to use different tools such as Immunity Debugger, Mona library for Immunity Debugger, Metasploit, msfvenom, Spike, File Fuzz and much more. This course is intended to be practical.

In this course, we will answer the following questions:

What is Buffer Overflow?

How do buffer overflow attacks work?

How to find buffer overflow vulnerabilities?

How to write a buffer overflow exploit?

Syllabus:

  • Reverse engineering.

  • Fuzzing applications.

  • Using a debugger to examine the crash.

  • Identifying error conditions using debugging.

  • Targeting the EIP register.

  • Identifying bad characters.

  • Locating the vulnerable module.

  • Creating final exploit code.

  • Exploit development.

  • Gain Remote Code Execution on Windows.

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 10 hours.

NOTE: This course is created for educational purposes only.

Reverse Engineering with Radare 2

Harness the Power of the Open-Source Radare2 for Your Reverse Engineering Projects

Created by Geri Revay - Penetration Tester/ Ethical Hacker

"]

Students: 1327, Price: $99.99

Students: 1327, Price:  Paid

In this course we will learn about the Radare 2 reverse engineering framework. It is an open source free alternative to IDA Pro. I started to work with it because I think nobody will buy IDA Pro unless it is paid by your employer. Radare 2 is a perfect free alternative, its only disadvantage is that it could be hard to start using it. This is where this course comes in. My goal was to get you over the hard part as fast as possible. So that you can get comfortable with Radare 2.

These are the things you will learn in this course:

  • Setting up Radare

  • Understanding its syntax

  • Understanding its config

  • Information gathering about the binary

  • Navigation in the binary

  • Cross references

  • Run-time debugging

  • Patching the binary

However there are a few things that are not goals of this course:

  • We are going to focus on the tool and not on assembly, so this is not an assembly course. You can follow along without understanding everything in assembly and that is fine, but don’t expect that you can learn assembly in a few hours.

  • We will learn some reverse engineering techniques but it is not our goal to learn everything.

However what you are definitely will learn is how to use Radare 2, and after this course if you need to analyse a binary you will be able to pull out radare from your sleeves anytime you need it.

All exercises are hand-on, so you are expected to repeat the exercises yourself. I have done quite a lot of trainings myself, live or online, and I can tell you that without practicing they won't stick. This is a really practical training so I encourage you to try everything yourself, because just watching the videos will only give you the illusion that you learnt something, 80% of the learning happens when you do the exercises.

Reverse Engineering Essentials

Tools and Techniques for Windows Malware Analysis

Created by Cristina Gheorghisan - Trainer and Coach

"]

Students: 899, Price: $99.99

Students: 899, Price:  Paid

The aim of this course is to cover the essentials techniques and tools for reverse engineering and malware analysis. As the title suggests, we will cover only the Windows environment in this class, since it is by far the most used and abused. We try to provide a complete picture for the starting reverse engineer but in the same time relevant for the more advanced analysts.

There are always multiple ways to do a task. We will insist more on "Why?"s instead of "How?"s since we consider that it's more important to understand WHAT we're trying to achieve and WHY.

There are no pre-requisites for this class other that a Windows virtual machine and the will to learn. All the tools discussed here are freely available online. Analyses are demonstrated on a Windows 8.1 virtual machine.

Don't worry! Neither professional programming experience nor assembly language knowledge are required to benefit from the course. If you know these already, it would be helpful when we’ll look at identifying encryption algorithms and bypass anti-virtualisation checks. The concepts will be explained clearly and additional resources will be recommended.

Some programming experience will definitely be beneficial, however, the focus will be mostly on understanding the technique, the tools and their most useful features. When needed, source code written in C or Python will be provided.

To get the most out of this course, we recommended to try all the exercises and assignments that follow the lectures and whenever a concept or idea is not fully explained or clearly understood, either reach out with questions on the Q&A section or consult online resources.

Malware analysis and reverse engineering

Learn how to analyse and fight malicious code, such as viruses, worms, trojans, or ransomware. Become malware analyst!

Created by Nikola Milosevic - AI and cyber-security expert

"]

Students: 505, Price: $24.99

Students: 505, Price:  Paid

Every cyber-attack utilizes some malicious code and some malware. The average loss that a company suffers from a single malware attack is $2.4 million. Companies around the world are losing billions of dollars every year because of information security breaches usually caused by malware. The number of malware attacks grows yearly at an exponential rate. Malicious code or malware is a piece of code that intends to harm or disrupt computer operation of the victim. If you want to understand how malware and cyber-attacks work, this is the right course for you. In this course, you will learn how to analyse malware and incidents that happened using the malicious code.

This course is intended for anyone who wants to know how malware analysis and reverse engineering of software is performed. This course can train you for a career in any of the anti-virus companies around the world or can give you skills that you can use to analyse and stop breaches to the networks of organizations you work with.

The course is tough by Dr. Nikola Milosevic, a PhD in computer science with track record of publications and successful projects in information and cyber-security. Nikola is OWASP chapter and project leader and has been teaching on several reputable Universities over the past 5 years.  I have also published scientific papers on malware analysis. Now he wants to share this knowledge with you and help you develop your career!

This course will teach you the following:

  • History of malware and malicious software on PC (from Brain.A to Stuxnet and further)

  • The topology of malware (you will learn what is virus, worm, Trojan, rootkit, ransomware, mobile malicious code, etc.)

  • How malicious software work and propagate, how they use exploits

  • How to build your own malware analysis lab

  • How to perform static and dynamic malware analysis

  • How to apply your skills to reverse engineer non-malicious software and gain insight into how they operate

  • How AI and machine learning can help to detect malware

In this course, you will also learn how to fingerprint malware and use tools like WinMD5, Strings, PEid, Dependency Walker, Resource Hacker, WinHex, OllyDbg, IDA Pro, Process Monitor, Process Explorer, RegShot, Wireshark, NetCat, etc.

The course does not require any particular previous knowledge, apart from your apatite to learn and basics of networking, how operating systems work and a tiny bit of programming. However, if you are versed in computer science and interested in security, this is the right course for you.

Go ahead and enroll!

Introduction To Reverse Engineering And Malware Analysis

Purple Team Courses Part 2 Intorduction To Malware Analysis

Created by Alparslan Akyıldız - Instructor At University, Founder Of Siber Guru Academy

"]

Students: 109, Price: $49.99

Students: 109, Price:  Paid

Malware analysis is very important issue for Cyber security analyst to create IOC's. So In this course students will learn Malware Analysis Techniques, Assembly Fundamentals, Rverse Basics, Reversing RATs and Keylogger files, Memory Analysis, Windows Internals, Remnux, Dynamic Malware Analysis Techniques, Static Malware Analysis Techniques, Malicious Document Analysis. Reverse engineering is explained from scratch and lab demos are presented to the students.

Reverse Engineering and Exploit development in ARM

Introduction to Arm exploitation Part one

Created by Ajin Deepak - Ethical Hacker

"]

Students: 95, Price: $34.99

Students: 95, Price:  Paid

Hello,

Welcome to the cheapest and first course of Arm exploitation in Udemy.This course is purely for beginners.As you all know arm based devices are becoming more and more prominent these days so its important to learn about the securing them.i made this course highly practical so that it doesn't bore you as you go.This course Only requires just a PC we shouldn't be needing any raspberry pi or anything we will using emulated labs .This course is very basic and if you are already familiar with buffer overflows and format string exploitation this wouldn't be much help to you but still this can help you as a primer and as an introduction to ARM exploitation.

This course is focused on Arm v6 vulnerabilities and Exploitation (32 bit ).We will start off with some basic arm instructions and will move to the practical exploitation.The core sections of these course is Reverse engineering and binary exploitation.We will reverse and modify the behaviour of simple crackme programs using Ghidra,Binary ninja,Hopper etc.Then we will move into exploiting various binaries using format string vulnerabilities and buffer overflows.After that we will be look at  the protections used  by the binaries and bypassing them.We will be using ctf style examples mostly.As this is the part one of the course we will cover everything from the scratch.This course has a 30 day refund policy so even if you dont like this course you can just surely get your money 100%.

(NB : Its a ongoing course new contents will be added)

I suggest you to watch the sample videos and then deciding to buy this.

reverse engineering and exploit development in linux(x64)

computer architecture, file structure, assembly and c programming language, reverse engineering and exploit development

Created by mohamad gharishvandi - Master of Science in Electronics engineering

"]

Students: 76, Price: $89.99

Students: 76, Price:  Paid

i always wanted a course, a book or something which starts from scratch and brings me to an expert level. i saw and read a lot of courses which teach you the applications and software about security and hacking, learning those in security industry, is like knowing wordpress to design websites without understanding programming languages. so i started this course from scratch, from nothing.  because as einstein put it: "if you can't explain something simply then you don't understand it well enough".  in security the difference between experts and amateurs is just in the same statement. those who know the background science are those who DESIGN the metasploit and other softwares, and those who don't are the users of the programs. which one do you want to be?

if the answer is the first group, this the right place for you. we really start from nothing, introduce you the concept of data, that what do we mean by data, bits and bytes? we then introduce the basic element of all the digital devices: TRANSISTOR.

then we use that transistor to create the logic gates, nand and not gates. but we only create them if we need them, so before creating anything, we ask the question of "why do i need this?" . then we start to give a general overview of what a computer is, why we need it and how we are going to create it. that brings us to the concepts that as human we can't remember everything, so we needed something which could remember as long as we want it to, and more importantly we want it to do the computation so much faster that we ever could. those are the only two things that computer has over human brain. so based on that we proceed, a memory for remembering and a cpu for processing. so we start my using our nand gates to create both memory and cpu. and we test it, troubleshoot it, add features to it, until we have our computer.  now we save our program as a set of instructions inside the memory, the cpu would fetch those instructions, and execute them and move to the next one, and it does it over and over again. everything in the computer which is not hardware, is a program, a simple FILE.

so in the second chapter we start talking about files. if all the computer could know are 1s and 0s, how could it show us text and images, movies and executables. this is were we talk about file extensions and headers. so that it could be an introduction into getting us to the elf file format, the executables and binary files in linux. because if we want to reverse files and crack and hack them, first we need to know them. all its segment and section headers, but not just an overview, going deep , somehow that we comprehend every byte of it.  now its time for us to know how they get executed, or how they get created? using programming languages: ASSEMBLY

in the next chapter we enter the assembly world. why we need it , like always would be the main question, if we could anser it then we enter to HOW we do it.  we teach everything you need to know about assembly. and when we write a program we debug it using the gdb, analyze instructions one by one, so that you know the reason for each instruction. and at the same time we compare assembly with other higher level programming languages.

why we need c programming language would trigger the creation of the next chapter. variables, pointers, format specifers, functions, they are all just names without a concept and their comprehension, thats why for every single abstraction there is a separate lecture depicting the memory and stack(we explain what this is in an intuitive manner) organization and how it changes.

when we know all these sciences in such a different manner, then when we get to the reverse engineering and exploit development, the last two chapter, you see that these are just a different look of everything we have learned so far. just looking differently and keep track of memory.  and using these we would be able to reverse engineer malwares, hack and crack softwares. which means acquiring the offensive skills without which , you could never be a real hacker.

Learn How To Code a Hack For ANY Game! – Game Hacking

Learn to create game hacks (PUBG, Free Fire, and others) programmatically, and by using reverse engineering programs

Created by Fuad Nassar - Civil Engineer

"]

Students: 66, Price: $19.99

Students: 66, Price:  Paid

Do you like hacking games? ?

Do you want to know how hacker programs are created? ??

..

We have specially designed a course for you at Udemy

Which provides you with everything you will need to learn to hack games ?

The good news is that a new series has been created to learn to build ESP for the game programmatically

Hacker features, which will be explained and detailed: ?

Player ESP (2d box, 3d box, skeleton, ignore teammate, identify bot)

Item / Lootbox ESP

Vehicle ESP

Grenade Alert

Player Health / Name / Distance / Line

Simple Aimbot

Enemy State

Enemy Weapon

Course contents

Explanation of Game Garden and script construction in Lao language.

Learn to reverse engineer with powerful software like Idea Pro and DN Spy.

All sources and resources are completely free.

IP Address Subnetting and VLSM from beginning to advance

IP Addressing , Subnetting and VLSM with Reverse IP Engineering for all IT Professional to Fresher

Created by Ajay Sharma - Corporate Technical Trainer , CCIE(R&s) , AWS Certified

"]

Students: 48, Price: $24.99

Students: 48, Price:  Paid

Keen to learn about IPv4 , then this video Series is for you. Starting from very basics of IP introduction , decimal to binary no system conversion . 

For subnetting , Starting from introduction to subnetting, I have example of A,B,C class subentting to make it more clear . 

I have also included about VLSM , Reverse IP Engineering and Private and Public IP series in this video series. 

Windbg – A complete guide for Advanced Windows Debugging

This course has everything you need to master Windbg as well as, debugging and reverse engineering Windows OS using it.

Created by Anand George - DevOps Architect

"]

Students: 12, Price: $199.99

Students: 12, Price:  Paid

Discount code - JULY2021

Have you ever felt your windows operating system is hung or becoming slow or having a BSOD? Or an application crash or application hang or slow on windows? Have you had to press the restart button of your PC or the windows server to get rid of the problem and had no clue when that issue will happen again? Or you're asked to analyse a memory dump of a compromised system for isolating a malware?. If that bothers you, this training is all about root causing and solving such complicated issues once and for all, among many other topics it covers.

Windbg is the single most powerful, debugging and reverse engineering tool in windows platform. Windbg is like an x-ray plus mri plus ct scan for programs running on windows operating system, including the operating system itself. It helps us to root cause complicated problems like we discussed in windows ( OS ) and programs running inside the operating system.

Just like the name implies this training has all the details which you need to master windbg. I have spent all my efforts to make sure this is the best and most complete windbg training available right now and I will keep adding topics to make sure that the statement is true in the future as well.

Targeted audience

Due to any reason, if you are trying to use or learn windbg, you already know what you're doing and there is no better place than this course. If you have been following my youtube series, this course is a complete super set of it. Being said that following are some of the categories of students to whom, I strongly recommend this course.

Support engineers

If you are a support engineer or Escalation Engineer who is supporting any product on windows, or Windows itself, I definitely recommend this course.

Malware analyst and cyber security professionals.

If you are into core cyber security especially on windows platform this tool should be definitely in your arsenal. When it comes to reverse engineering, I myself don't prefer to compare ida pro or any other similar tool with windbg but I always found windbg is one of the most, if not THE most powerful and productive tool when it comes to reverse engineering along with debugging.

Windows SysAdmins

Another main targeted set of audience is Windows administrators who always can take leverage from tools like this and know more about the product they are working with and troubleshoot problems they face at a totally different level.

C and C++ Programmers

Last and not least may be the most important category of students - advanced C and C ++ programmers which includes, driver developers, testers, software maintenance engineers and so on. Are you wondering why your application is crashing, hanging, slow or taking too much resources? That too happens once in a blue moon in production and you have no way to reproduce the issue in your dev environment. Are you asked to debug a problem in a code base you have no clue about? Or you just want to see exactly what that latest feature of cpp 20 is doing behind the scenes? This training is for you.

To summarise, this course is for anyone who wants to study windows internals and advanced production debugging on windows. Post this training you don't have to read every single windows internals and debugging books out there but you will debug whatever you want to know whatever you want to know, rather than reading some abstract result from some books.

Post this training you will not have to read and learn OS internals from any books but you will debug and understand it as and when you need it.

Course Structure

This course has 3 chapters

In Chapter 1 we discuss the necessary concepts to get us started and mostly focus on the commands of the debugger.

In Chapter 2 we apply what we have learned in Chapter 1 to different debugging scenarios, like crashes, hangs, slowness, leaks and more. We will be using test applications for this chapter and we will have source code of these test applications. First we will discuss User mode issues and then we will go into Kernel mode.

In chapter 3 we will use the knowledge gained in Chapter 1 and 2 to troubleshoot real production like or production issues. In this chapter we will discuss analysis of memory dumps which we don't have source code or any idea about. We will start with issues from sysinternals notmyfault and slowly get into true production debugging scenarios. I will keep adding lessons to this chapter if there is enough interest from students on this course. Students also can submit dumps to this chapter and they can get the dumps analyzed for free of cost and share the experience with others.

Please refer to the course content and free preview lesson for more details about the structure and content of the course.

Chasing 100

7 Steps to Reverse Engineering Your Best Life

Created by Adnan Jalali - Intl Best Selling Author, Coach to Executives, Dream Chaser

"]

Students: 3, Price: $74.99

Students: 3, Price:  Paid

Nowadays, everyone talks about wanting to live their best lives, but how exactly do we do that? What does that even look like? Chasing 100 is a roadmap for designing your Best Life. You will walk away from the course knowing exactly where you're going and how to get there.