Aim
The aim of this course is to equip students to apply methodologies and tools used for discerning software functionality and to identify vulnerabilities in that software without prior access to the overarching program design.
If you wish to join a course you may have your agency POC send a seat request.
Please click on the POC Finder
to obtain the contact information of your agency POC.
Learning Objectives
Reverse Engineering Taxonomy:
Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will be able to discuss and understand reverse engineering taxonomy in accordance with the guidelines provided by the course material posted on Sakai.
General Reverse Engineering Procedures:
Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will identify general reverse engineering procedures, in accordance with the guidelines provided by the course material posted on Sakai.
Fundamentals Behind Software Reverse Engineering:
Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will understand the fundamentals behind software reverse engineering, in accordance with the guidelines provided by the course material posted on Sakai.
Common Software Vulnerabilities:
Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will understand common software vulnerabilities, in accordance with the guidelines provided by the course material posted on Sakai.
Identify Binary Signatures, and Conduct Follow-on Exploitation:
Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will be able to identify their binary signatures, and conduct follow-on exploitation, in accordance with the guidelines provided by the course material posted on Sakai.
Course Participants
Personnel (cyber staff officers (including intelligence officers), incident handlers, info - security managers, technicians and reverse engineers, malware cyber security specialists, system penetration engineers, and IP Sec engineers) whose work responsibilities require or would benefit from a deeper understanding of low-level software operation.
Language Proficiency: |
English 3333 IAW STANAG 6001 |
Rank Requirements: |
NCO: OR-2 thru OR-9
Officer: OF-1 thru OF-5
|
Methodology
This ten weeks course is a mix of lectures, readings, projects, and written examinations.
Lectures, Labs, the two exams, and Final project are conducted in class using Sakai during the resident weeks. DL problems are conducted using Sakai Collaborate during the non-resident weeks.
This course is designed so that the majority of the resources used in the teaching of the course will be supplied from the textbook as well as instructor’s materials, delivered in classroom (via PowerPoint presentations), and supplemented with classroom discussions. The student's time will average 3 to 5 hours a week during the DL segment of the course, required for the DL problems.