CYBR470 — Reverse Engineering
Software reverse engineering of binaries. Tools include disassemblers, debuggers, and decompilers for malware analysis and vulnerability discovery.
Learning Objectives & Matches
Disassemble and analyze binary executable code using tools like IDA Pro and Ghidra
Perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
Write program code to analyze data with statistical analysis software.
Monitor program performance to ensure efficient and problem-free operations.
Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.
Perform forensic investigations of operating or file systems.
Identify, analyze, and document problems with program function, output, online screen, or content.
Clean and manipulate raw data using statistical software.
Test programs or databases, correct errors, and make necessary modifications.
Test programs or databases, correct errors, and make necessary modifications.
Reverse engineer malware samples to understand functionality and extract indicators of compromise
Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
Perform security analyses of developed or packaged software components.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Analyze log files or other digital information to identify the perpetrators of network intrusions.
Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
Design security solutions to address known device vulnerabilities.
Monitor current reports of computer viruses to determine when to update virus protection systems.
Perform forensic investigations of operating or file systems.
Develop infiltration tests that exploit device vulnerabilities.
Gather cyber intelligence to identify vulnerabilities.
Identify and bypass anti-analysis techniques including obfuscation and packing
Develop or implement data analysis algorithms.
Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
Write new functions or applications in programming languages to conduct analyses.
Write detailed analysis plans and descriptions of analyses and findings for research protocols or reports.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Perform security analyses of developed or packaged software components.
Conduct logical analyses of business, scientific, engineering, and other technical problems, formulating mathematical models of problems for solution by computers.
Direct the analysis, development, and operation of complete computer systems.
Prepare data for processing by organizing information, checking for inaccuracies, and adjusting and weighting the raw data.
Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
Discover vulnerabilities in software through reverse engineering and analysis
Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
Perform security analyses of developed or packaged software components.
Scan networks, using vulnerability assessment tools to identify vulnerabilities.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Coordinate vulnerability assessments or analysis of information security systems.
Identify security system weaknesses, using penetration tests.
Identify security system weaknesses, using penetration tests.
Gather cyber intelligence to identify vulnerabilities.
Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
Develop infiltration tests that exploit device vulnerabilities.
Analyze compiled code to understand program behavior and logic