Training at a Glance

Vector illustration of an audience watching an instructor on screen

Format

  • Classroom training

Vector illustration of 3 people serving as an audience

Audience

  • Embedded system developers
  • Security researcher
  • Analysts

Vector illustration of a stopwatch timer

Duration

  • 3 courses
  • 4 days, 8 hours each

Vector illustration of certificate or diploma

Outcomes

  • Expert-level reverse engineering techniques
  • Capable of identifying and mitigating potential vulnerabilities in embedded systems

A Deep Dive into Reverse Engineering

Dive deep into static and dynamic analysis techniques using tools like IDA Pro and GDB. Learn how to dissect system architecture, analyze firmware, and identify common vulnerabilities such as memory corruption and command injection. The goal of the training is to enable security professionals to develop ways to defend against future attacks.

Training Outline

Interested in this service? Reach out to learn more.

中国