Understanding Code Injections From Beginner To Advanced
Online course
Abstract

Code injection is a technique that is becoming increasingly prevalent in attacks and data breaches. Both malware writers and dedicated penetration teams rely on these techniques to bypass defenses and achieve persistence. This course gives a comprehensive coverage of code injection techniques and will teach the student how to analyse, reverse engineer and write applications that use code injections. As such, this course is focused on both defensive and offensive techniques as well as development and code analysis.

Course Objectives
Learning Objectives

The fundamental aspects that make code injection possible

A large set of code-injection techniques such as DLL and PE injection, Thread hijacking, Process hollowing, PowerLoader, AtomBombing, Early bird

Return oriented programming (ROP)

Chaining code injections together like APT malware

Prerequisites

Good understanding of computer systems and assembly-level reasoning. The course is heavily focused on development, so exposure to C/C++ coding is a benefit, and experience with Windows Internals is recommended.

Who should attend?

Malware analysts

Security researchers

Threat analysts

Incident responders

Red teamers

Security engineers

Any others who are interested in how applications can execute throughout the entire system in non-conventional ways.

Course syllabus

This course is not released online yet. Once it is realesed we the syllabus will be available here.

You get

Lecture videos

Lecture notes

Hands-on exercises of varying difficulty

24/7 access to platform and self-paced course

6 months subscription to online training platform

Instructor support throughout entire course

Course updates during subscription period

Looking to train your entire team?

ADA Logics offers business solutions that allow you to easily manage the training of your entire team.

To know more, get in touch now.

Contact Sales
Have a question about this course?

Get in touch today with any questions that you might have.

Contact Us