
Highlight #1
Describe a key feature that sets you apart, solves a problem, or adds value to your users.

Highlight #2
Describe a key feature that sets you apart, solves a problem, or adds value to your users.

Highlight #3
Describe a key feature that sets you apart, solves a problem, or adds value to your users.
About the course
Use this to describe your product. Speak directly to your audience, address their challenges, and show them how your product provides a solution to their problems. Consider what might be holding your target audience back, and tackle those potential concerns upfront. Make sure you clearly state the practical benefits your audience will gain from your product. Share a glimpse of your expertise or the special approach that sets your product apart from the rest. Don’t forget to add a clear and simple call-to-action so that your audience knows exactly how and where to sign up!

Your Name
Introduce yourself to your audience. How did you become an expert in your field? What challenges did you face on your way to success? How did you overcome them? Why are you excited to share your knowledge? What is your biggest goal with regards to teaching?
Curriculum
-
1
1. Disassembly and Disassembler
-
(Included in full purchase)
1. The Disassembly Theory
-
(Included in full purchase)
2. Disassembly - What
-
(Included in full purchase)
-
2
2. Binary Analysis
-
(Included in full purchase)
1. Analysis of Binary and 4 Stages of Compilation
-
(Included in full purchase)
2. Preprocessing
-
(Included in full purchase)
3. Compilation Phase
-
(Included in full purchase)
4. Assembly Phase
-
(Included in full purchase)
5. Linking Phase
-
(Included in full purchase)
-
3
3. Linux - ELF Format
-
(Included in full purchase)
1. Exploring the Executable and Linkable Format (ELF) and Executable Header
-
(Included in full purchase)
2. Learning ELF Fields
-
(Included in full purchase)
3. Learning ELF Program Header Fields
-
(Included in full purchase)
-
4
4. Windows - PE Format
-
(Included in full purchase)
1. Fundamentals of Windows PE Format
-
(Included in full purchase)
-
5
5. Symbols, Stripped and Not Stripped Binaries
-
(Included in full purchase)
1. Using READELF for Viewing Symbolic Information
-
(Included in full purchase)
2. Revealing Contents of Object File
-
(Included in full purchase)
3. Trying to Analyze Binary Executable
-
(Included in full purchase)
4. How binary loads and executes in theory
-
(Included in full purchase)
-
6
6. Reverse Engineering and Malware Analysis - Installing Ghidra
-
(Included in full purchase)
1. Downloading Ghidra and File Structure
-
(Included in full purchase)
2. Installing JDK in Linux
-
(Included in full purchase)
3. Installing JDK in Windows or MacOS
-
(Included in full purchase)
4. Installing SASM
-
(Included in full purchase)
-
7
7. Writing our first 64Bit Assembly Program
-
(Included in full purchase)
1. Hello world with makefile
-
(Included in full purchase)
2. Why nasm is best and compare assemblers
-
(Included in full purchase)
3. Sticking to traditions - Hello world program without makefile
-
(Included in full purchase)
-
8
8. Understanding Data Types
-
(Included in full purchase)
1. Understanding CPU architectures and Binaries
-
(Included in full purchase)
2. Converting Decimal to Binary with Basic Math
-
(Included in full purchase)
-
9
9. Debugging x86-64
-
(Included in full purchase)
1. Starting gdb and setting flavors
-
(Included in full purchase)
2. Debugging and Finding Variables in Memory addresses
-
(Included in full purchase)
3. Learning more with GDB
-
(Included in full purchase)
-
10
10. Writing our second 64Bit Assembly Program
-
(Included in full purchase)
1. Coding ASM file
-
(Included in full purchase)
2. Analyzing Output with GDB and creating makefile
-
(Included in full purchase)
-
11
11. OR XOR AND
-
(Included in full purchase)
1. The OR
-
(Included in full purchase)
2. NOT
-
(Included in full purchase)
3. XOR
-
(Included in full purchase)
4. AND
-
(Included in full purchase)
-
12
12. Data Display Debugger - DDD
-
(Included in full purchase)
1. Developing another Assembly Program to Analyze with DDD
-
(Included in full purchase)
2. Analyzing Previously Written Code
-
(Included in full purchase)
3. Using DDD and Analyzing RAX Values
-
(Included in full purchase)
-
13
13. Jump and Loop
-
(Included in full purchase)
1. Using Conditions and Jumping
-
(Included in full purchase)
2. Jump if equal
-
(Included in full purchase)
3. Jump if Not Equal
-
(Included in full purchase)
4. Jump if Greater
-
(Included in full purchase)
5. Greater than or Equal to
-
(Included in full purchase)
6. Jump if Less
-
(Included in full purchase)
7. Jump if less or equal
-
(Included in full purchase)
8. Jump if Above
-
(Included in full purchase)
9. Jump if Above or Equal
-
(Included in full purchase)
10. Jump if below
-
(Included in full purchase)
11. Jump if below or equal
-
(Included in full purchase)
-
14
14. Assembly Project using Jump and Loop
-
(Included in full purchase)
1. Developing Loop and Calculator Project with Assembly
-
(Included in full purchase)
2. Testing our Project
-
(Included in full purchase)
-
15
15. Memory Manipulation
-
(Included in full purchase)
1. Project EXABYTE
-
(Included in full purchase)
2. Testing and Analyzing Project with Readelf and GDB
-
(Included in full purchase)
-
16
16. Calculator with Assembly
-
(Included in full purchase)
1. Defining variables
-
(Included in full purchase)
2. Addition and Subtraction
-
(Included in full purchase)
3. Last Decorations
-
(Included in full purchase)
4. Explaining Registers in Practice
-
(Included in full purchase)
5. Completing Section
-
(Included in full purchase)
-
17
17. Starting with Ghidra
-
(Included in full purchase)
2. Discovering Ghidra
-
(Included in full purchase)
1. Opening project in Ghidra
-
(Included in full purchase)
-
18
18. Malware Analysis and Reverse Engineering with Ghidra
-
(Included in full purchase)
1. Starting Real Malware Analysis with Ghidra
-
(Included in full purchase)
2. Analyzing Suspicious String using Ghidra
-
(Included in full purchase)
3. OSINT for Reverse Engineering
-
(Included in full purchase)
4. Analyzing Libraries that Malware Uses
-
(Included in full purchase)
5. Extracting SYS file from Malware
-
(Included in full purchase)
6. Finding Entry Points and Changing Undefined Function Names
-
(Included in full purchase)
-
19
19. IDA Pro IDA Freeware
-
(Included in full purchase)
2. Being friends with IDA
-
(Included in full purchase)
3. Useful Tabs in IDA
-
(Included in full purchase)
1. Downloading and Installing IDA Pro _ IDA Freeware
-
(Included in full purchase)
Add a clear and direct call-to-action
Seal the deal with a bit more content that supports the main call to action.
$59.00