Academics > Portfolio >

Course Catalogue

M6-148

Principles of Software Reverse Engineering

Conducted by COSEC

Aim

The aim of this course is to equip students to apply methodologies and tools used for discerning software functionality and to identify vulnerabilities in that software without prior access to the overarching program design.

Details

Duration: 10 Weeks
Course Structure: Resident (1) - eLearning (8) - Resident (1)
Language: English 3333 IAW STANAG 6001
Classification: NATO Unclassified
Discipline: COP - Cyberspace Operations
Area: CD - Cyber Defence Operations
Depth of Knowledge: 3 - Advance
ePrime No.: N/A
ETOC Code: COP-CD-36915

Course Iterations

Code Course Dates Open Seats
M6-148-A-23 11 Sep 23 - 17 Nov 23
M6-148-A-24 13 May 24 - 19 Jul 24 7

If you wish to join a course you may have your agency POC send a seat request. Please click on the POC Finder to obtain the contact information of your agency POC.

Learning Objectives

Reverse Engineering Taxonomy: Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will be able to discuss and understand reverse engineering taxonomy in accordance with the guidelines provided by the course material posted on Sakai.

General Reverse Engineering Procedures: Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will identify general reverse engineering procedures, in accordance with the guidelines provided by the course material posted on Sakai.

Fundamentals Behind Software Reverse Engineering: Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will understand the fundamentals behind software reverse engineering, in accordance with the guidelines provided by the course material posted on Sakai.

Common Software Vulnerabilities: Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will understand common software vulnerabilities, in accordance with the guidelines provided by the course material posted on Sakai.

Identify Binary Signatures, and Conduct Follow-on Exploitation: Based on lectures, guided, hands-on lab exercises and independently completed challenge problems, students will be able to identify their binary signatures, and conduct follow-on exploitation, in accordance with the guidelines provided by the course material posted on Sakai.

Course Participants

Personnel (cyber staff officers (including intelligence officers), incident handlers, info - security managers, technicians and reverse engineers, malware cyber security specialists, system penetration engineers, and IP Sec engineers) whose work responsibilities require or would benefit from a deeper understanding of low-level software operation.

Language Proficiency: English 3333 IAW STANAG 6001
Rank Requirements: NCO: OR-2 thru OR-9
Officer: OF-1 thru OF-5

Methodology

This ten weeks course is a mix of lectures, readings, projects, and written examinations.
Lectures, Labs, the two exams, and Final project are conducted in class using Sakai during the resident weeks. DL problems are conducted using Sakai Collaborate during the non-resident weeks.
This course is designed so that the majority of the resources used in the teaching of the course will be supplied from the textbook as well as instructor’s materials, delivered in classroom (via PowerPoint presentations), and supplemented with classroom discussions. The student's time will average 3 to 5 hours a week during the DL segment of the course, required for the DL problems.

Further Information

This is a technical course that requires programming experience. The target audience is personnel (info - security managers, technicians and reverse engineers, malware cyber security specialists, system penetration engineers, and IP Sec engineers) those work responsibilities require or would benefit from a deeper understanding of low-level software operation.