SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
After enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.
PS: don't forget your files from Part 5; you'll need them!
Take the whole series!
System Requirements:
Support during the workshop will be offered in the SANS Offensive Ops Discord here.
Join the #sans-workshop channel here.


Jonathan Reiter teaches advanced red team operations and Windows implant development through hands-on labs grounded in real-world experience.
Read more about Jonathan Reiter