Skip to main content

Topic outline

  • This topic
  • CH01_Getting started with x64dbg

    Restricted Not available unless: You are a(n) Student
  • CH02_Other concepts in x64dbg & IDA Debugger Overview

    Restricted Not available unless: You are a(n) Student
  • CH03_Common Malware Behavior

    Restricted Not available unless: You are a(n) Student
  • CH04_Anti Debugging Techniques_Chapter Introduction

    Restricted Not available unless: You are a(n) Student
  • CH05_Introduction to Data Encoding and Encryption

    Restricted Not available unless: You are a(n) Student
  • CH06_Advanced Dynamic Analysis for 2 Malware Samples

    Restricted Not available unless: You are a(n) Student
  • CH07_Malicious Microsoft Office Document Analysis

    Restricted Not available unless: You are a(n) Student
  • CH08_Malicious PDFS Analysis

    Restricted Not available unless: You are a(n) Student
  • CH09_Malicious JavaScript, PowerShell, VBScript Analysis

    Restricted Not available unless: You are a(n) Student
  • CH10_Reverse-Engineering ILS and Scripting Languages

    Restricted Not available unless: You are a(n) Student
  • CH11_Malicious Android APK Analysis

    Restricted Not available unless: You are a(n) Student
  • Next Steps

    Restricted Not available unless: You are a(n) Student
  • Certificates

    Restricted Not available unless: You are a(n) Student

    Certificate will be available after completion course within 1 Hour