1 00:00:00,610 --> 00:00:08,470 I am poaching and welcome to these calls and tyto now development and reverse engineering one the basics. 2 00:00:09,130 --> 00:00:14,830 Many Melva analysts perform reverse engineering on malgre without knowing the whys. 3 00:00:15,250 --> 00:00:18,760 They only know how to fill that knowledge you get. 4 00:00:19,030 --> 00:00:21,130 I had created this course. 5 00:00:21,760 --> 00:00:28,720 You will learn firsthand from a Malverde developer's perspective what Windows API functions are commonly 6 00:00:28,720 --> 00:00:30,030 used in Norway. 7 00:00:30,490 --> 00:00:35,440 And finally, I understand why you need to treat them then reversing Nelva. 8 00:00:36,220 --> 00:00:43,330 The learning methodology used in this course are to build programs that simulate Windows Trojan's and 9 00:00:43,330 --> 00:00:44,200 reverse engineering. 10 00:00:44,200 --> 00:00:49,270 And this will make you a better reverse engineer and know the analyst. 11 00:00:49,360 --> 00:00:51,430 And also penetration testing. 12 00:00:52,060 --> 00:00:56,560 The best way to understand malware is to be a malware developer. 13 00:00:58,600 --> 00:01:07,870 What you will learn in this course, you will learn how to build Xs and Valse Windows APIs used in Nowlan 14 00:01:08,350 --> 00:01:17,930 Create Chalco, Metasploit, Heidi Batel in EMC files injecting beta into remote processes, encrypting 15 00:01:17,950 --> 00:01:19,360 and encoding payloads. 16 00:01:19,810 --> 00:01:25,090 Function, call, obfuscation and coopting function call string parameters. 17 00:01:25,660 --> 00:01:27,370 Now they're stealth strategies. 18 00:01:27,910 --> 00:01:32,290 Trojan development lifecycle using yaara to study. 19 00:01:32,320 --> 00:01:37,030 Now their signatures, antivirus evasion techniques and more. 20 00:01:39,470 --> 00:01:40,970 Oh, this course is full. 21 00:01:41,630 --> 00:01:49,220 This course is for students who like to get started on the career path to become now analyst or penetration 22 00:01:49,220 --> 00:01:56,420 test, if it is also for reverse engineering and no analysts, students also for programmers who want 23 00:01:56,420 --> 00:02:03,320 to know how well they is created and also for penetration testers and ethical hackers. 24 00:02:04,570 --> 00:02:12,340 The prerequisites for this course are Windows B.S. Some basic language would be helpful and also some 25 00:02:12,340 --> 00:02:16,960 basic business commands would be useful, although not strictly necessary. 26 00:02:18,010 --> 00:02:24,610 My background, my profession, I'm a retired college lecturer and I had been teaching computer science 27 00:02:24,610 --> 00:02:26,650 19 command and 20 years. 28 00:02:26,980 --> 00:02:30,280 I welcome you to this course and I'll see you inside.