Focus
Focus areas
- Step 1
Static analysis, assembly crash courses, and TLS unpacking so you can decode real-world ransomware, botnets, and RAT samples with confidence.
- Step 2
Dynamic behavior, debugging/disassembly, and Windows API investigation that let you instrument samples, observe persistence, and collect forensic breadcrumbs.
- Step 3
Reverse-engineering theory, manual unpacking, anti-reversing bypasses, and IA-32/x64 architecture knowledge that prepare you to document exploits and create detection signatures.