TRAINING

Stage 6 Reconstructive Computing and Reverse Engineering

The sixth stage of the CIC training will introduce reverse engineering concepts and discuss how they can be applied for digital investigation practices and operations. Linux post-exploitation basics, malware analyses, undercover cyberagents, web application tracking, and reverse engineering applications will be explored.



START YOUR PAGE

Center for Cybercrime Investigation
and Cybersecurity

Director : Kyung-Shick Choi
Main Office : 46 Warren Ave, Milton, MA 02186

Training Center : 1010 Commonwealth Ave. Room 515 Boston, Massachusetts 02215

TEL :  617-358-2807  |  FAX : 617-358-3595
EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved |
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org

Center for Cybercrime Investigation and Cybersecurity

Director : Kyung-Shick Choi  |  Main Office : 46 Warren Ave, Milton, MA 02186
Training Center : 1010 Commonwealth Ave. Room 515 Boston, Massachusetts 02215

TEL :  617-358-2807  |  FAX : 617-358-3595  |  EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC  | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org