What did we discover about the world’s cyber workforce capabilities? Dive into the data with us to find out. Read More
Home > Blog > Introduction to Static Code Analysis for Reverse Engineering
Introduction to Static Code Analysis for Reverse Engineering
Immersive Labs Announces New Series for Incident Responders and Threat Hunters
What are they?
Reverse engineering helps you understand how something works, and it’s usable in the context of malware analysis and binary exploitation.
These three introductory series will help you understand how to approach malware from an in-depth perspective, and help you analyse the make-up of programs in order to exploit them.
This skill series takes you through the basics of how modern day computers work. You’ll gain an understanding of different computer architectures, hardware, software, and the operating systems that everyone interacts with daily.
Assembly language is an abstraction of machine code, and is notoriously complex to work with. This series will teach you how to write assembly language for different operating systems, as well as the nuances involved for both 32-bit and 64-bit architectures.
Introduction to Reverse Engineering
Reverse engineering is one of the hardest but ultimately rewarding skills in cyber security. By completing this series of labs, you will gain hands-on reverse engineering experience, learn how the process works and understand how to begin reverse engineering an artefact.
Why are these series important?
Malware and exploits are big business – they’re exactly what companies must defend against. The series will introduce you to these practices and provide fundamental knowledge around them.
Who are they for?
Access to our platform is required to utilize this series. Request a demo to learn more.
January 25, 2021
Let’s Get Started.
Take a tour of our platform and get hands-on with emerging threats, custom challenges and realistic cyber crisis simulations