COURSE

HOME  /  COURSE

Stage 6 Reconstructive Computing and Reverse Engineering

The sixth stage of the CIC training will introduce reverse engineering concepts and discuss how they can be applied for digital investigation practices and operations. Linux post-exploitation basics, malware analyses, undercover cyberagents, web application tracking, and reverse engineering applications will be explored.


Center for Cybercrime Investigation
and Cybersecurity

Director : Kyung-shick Choi
Main Office : 46 Warren Ave, Milton, MA 02186

Training Center : 30 JFK Street (3rd Floor), Cambridge, MA 02138

TEL :  617-358-2807  |  FAX : 617-358-3595
EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved |
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org

Center for Cybercrime Investigation and Cybersecurity

Director : Kyung-shick Choi  |  Main Office : 46 Warren Ave, Milton, MA 02186
Training Center : 30 JFK Street (3rd Floor), Cambridge, MA 02138

TEL :  617-358-2807  |  FAX : 617-358-3595  |  EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC  | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org