Description

Learn in a few weeks how and in which context to apply the different techniques of Reverse Engineering in Cybersecurity”

##IMAGE##

Reverse Engineering Techniques, such as Static Code Analysis and Dynamic Analysis for the Decryption of Communication Protocols, lead to a sufficient understanding of the protocol, which allows us to develop our own programs that show us how to use the protocol.   

It is common to perform audits of the software being developed to detect vulnerabilities: Sometimes the vulnerability is not found in the source code, but is introduced by the compiler that generates the machine code. 
Knowledge in reverse engineering and, therefore, in how we obtain the machine code will allow us to detect such vulnerabilities.

One of the best known applications of reverse engineering is malware analysis which, through different techniques such as sandboxing, will provide an understanding and knowledge of the malicious software under study and, thereby, allow the development of software capable of detecting and counteracting it, as in the case of antivirus software that works on the basis of signatures. 

To this we must add an exclusive Masterclass that complements the syllabus of this program. With the participation of a professional of great international relevance, specialized in Intelligence, Cybersecurity and Disruptive Technologies. 

Complete your learning in Reverse Engineering in Cybersecurity thanks to the exclusive Masterclass designed by an internationally renowned teacher" 

This Postgraduate certificate in Reverse Engineering in Cybersecurity contains the most complete and up-to-date program on the market. The most important features include: 

  • The development of case studies presented by cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Analyze Reverse Engineering techniques in a professional growth process that will allow you to increase the security levels of your codes"

The program’s teaching staff includes professionals from the industry who contribute their work experience to this program, as well as renowned specialists from leading societies and prestigious universities.  

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive education programmed to learn in real situations.  

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts. 

A high education process created to be affordable and flexible, with the most interesting methodology of online teaching"

##IMAGE##

Study through a practice-focused Postgraduate certificate, boosting your skills to the level of a specialist"

Syllabus

Acquiring accurate and up to date knowledge in the field of Reverse Engineering in Cybersecurity is easy thanks to the practical approach of this Postgraduate certificate. To this end, it has been structured with a view to the efficient acquisition of complementary learning, which will promote the acquisition of hands-on content and consolidate what has been studied, providing students with the capacity to intervene as quickly as possible. A high-intensity, high-quality course created to educate the best in the industry.

##IMAGE##

Learn in just a few weeks how the application of Reverse Engineering provides invaluable data for cybersecurity intervention"

Module 1. Reverse Engineering

1.1. Compilers

1.1.1. Types of Codes
1.1.2. Phases of a Compiler
1.1.3. Table of Symbols
1.1.4. Error Manager
1.1.5. GCC Compiler

1.2. Types of Analysis in Compilers

1.2.1. Lexical Analysis

1.2.1.1. Terminology.
1.2.1.2. Lexical Components
1.2.1.3. LEX Lexical Analyzer

1.2.2. Parsing

1.2.2.1. Context-free Grammars
1.2.2.2. Types of Parsing

1.2.2.2.1. Top-down Analysis
1.2.2.2.2. Bottom-up Analysis

1.2.2.3. Syntactic Trees and Derivations
1.2.2.4. Types of Parsers

1.2.2.4.1. LR Analyzers (Left to Right)
1.2.2.4.2. LALR Analyzers

1.2.3. Semantic Analysis

1.2.3.1. Attribute Grammars
1.2.3.2. S-attributes
1.2.3.3. L-attributes

1.3. Data Structures in Assembler

1.3.1. Variables
1.3.2. Arrays
1.3.3. Pointers
1.3.4. Structures
1.3.5. Objects

1.4. Assembler Code Structures

1.4.1. Selection Structures

1.4.1.1. If, else if, Else
1.4.1.2. Switch

1.4.2. Iteration Structures

1.4.2.1. For
1.4.2.2. While
1.4.2.3. Use of Break

1.4.3. Functions

1.5. X86 Architecture Hardware

1.5.1. x86 Processor Architecture
1.5.2. x86 Data Structures
1.5.3. x86 Code Structures
1.5.4. x86 Code Structures

1.6. ARM Architecture Hardware

1.6.1. ARM Processor Architecture
1.6.2. ARM Data Structures
1.6.3. ARM Code Structures

1.7. Static Code Analysis

1.7.1. Disassemblers
1.7.2. IDA
1.7.3. Code Rebuilders

1.8. Dynamic Code Analysis

1.8.1. Behavioral Analysis

1.8.1.1. Communication
1.8.1.2. Monitoring

1.8.2. Linux Code Debuggers
1.8.3. Windows Code Debuggers

1.9. Sandbox

1.9.1. Sandbox Architecture
1.9.2. Sandbox Evasion
1.9.3. Detection Techniques
1.9.4. Avoidance Techniques
1.9.5. Countermeasures
1.9.6. Sandbox and Linux
1.9.7. Sandbox and Windows
1.9.8. Sandbox on MacOS
1.9.9. Sandbox on android

1.10. Malware Analysis

1.10.1. Malware Analysis Methods
1.10.2. Malware Obfuscation Techniques

1.10.2.1. Executable Obfuscation
1.10.2.2. Restriction of Exe

##IMAGE##

A process of maximum interest for the professional working in cybersecurity, which will bring you up to date and propel you into the job market"

Postgraduate Certificate in Reverse Engineering in Cybersecurity

In the IT field, there are different reasons for applying various reverse engineering techniques in order to understand software, communication protocols or algorithms. This management is crucial for professionals to develop specific programs that provide more effective protection and greater responsiveness to potential cyber-attacks. With this Postgraduate Certificate in Reverse Engineering in Cybersecurity, you can acquire these skills intensively and in a short time, with the guarantee and support of TECH.

Boost your career by mastering the fundamentals of Reverse Engineering in Cybersecurity

Thanks to the Postgraduate Certificate in Reverse Engineering in Cybersecurity, you will analyze compilers and their types in depth, as well as data structures in the assembler. These and many more topics will be at your fingertips in a 100% online program in which you will benefit from the experience of experts in Cybersecurity. In addition, you will manage the academic resources in the terms that you deem appropriate.