What You Need to Know Before
You Start

Starts 5 July 2025 04:10

Ends 5 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Submerssion Therapy - Ticking Me Off From Threat Intel to Reversing

Discover the world of threat intelligence and reverse engineering with the insightful session "Submerssion Therapy - Ticking Me Off From Threat Intel to Reversing." Led by expert Juan Cortes, this event delves into advanced cybersecurity practices and methodologies, providing valuable insights and strategies for tackling modern security chall.
via YouTube

2777 Courses


22 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Discover the world of threat intelligence and reverse engineering with the insightful session "Submerssion Therapy - Ticking Me Off From Threat Intel to Reversing." Led by expert Juan Cortes, this event delves into advanced cybersecurity practices and methodologies, providing valuable insights and strategies for tackling modern security challenges. Ideal for cybersecurity enthusiasts, this session is hosted on YouTube and falls under the categories of Artificial Intelligence Courses and Conference Talks.

Enhance your understanding of cybersecurity with Juan's expert guidance and elevate your skills in threat intel and reversing techniques.

Syllabus

  • Introduction to Submersion Therapy and Course Overview
  • Overview of Advanced Cybersecurity Practices
    Course Objectives
  • Fundamentals of Threat Intelligence
  • Understanding Threat Landscapes
    Key Concepts in Threat Intelligence
    Tools and Technologies in Threat Intelligence
  • Data Collection and Analysis
  • Sources of Threat Intelligence Data
    Techniques for Data Analysis
    Case Study: Real-world Threat Intelligence Scenarios
  • Threat Intelligence Applications
  • Threat Modeling Techniques
    Integrating Threat Intelligence into Cyber Defense Strategies
    Building an Effective Threat Intelligence Program
  • Introduction to Reverse Engineering
  • Core Principles of Reverse Engineering
    Tools and Environments for Reversing
  • Static Analysis Techniques
  • Understanding Binary Structures
    Using Disassemblers and Decompilers
    Conducting Code Analysis
  • Dynamic Analysis Techniques
  • Debugging and Monitoring Executable Code
    Sandboxing and Emulation Tools
    Case Study: Dynamic Analysis of Malicious Code
  • Malware Analysis and Reverse Engineering
  • Types of Malware and Their Characteristics
    Techniques for Malware Dissection
    Unpacking and Reconstructing Malicious Code
  • Threat Intelligence and Reverse Engineering Integration
  • Utilizing Reverse Engineering in Threat Analysis
    Enhancing Threat Intelligence with Reversal Findings
    Hands-on Lab: Case Study Analysis
  • Advanced Strategies and Techniques
  • Evolving Threat Landscapes and Adaptation Strategies
    Future Trends in Threat Intelligence and Reverse Engineering
  • Final Project
  • Application of Course Techniques to a Real-World Scenario
    Presentation and Peer Review
  • Course Wrap-Up and Next Steps
  • Review of Key Learnings
    Additional Resources in Cybersecurity and Reversing Techniques

Subjects

Conference Talks