SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAfter enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.
PS: don't forget your files from Part 5; you'll need them!
Take the whole series!
System Requirements:
Support during the workshop will be offered in the SANS Offensive Ops Discord here.
Join the #sans-workshop channel here.
Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS.
Read more about Jonathan Reiter