SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn part 6 of the series we learned about the anatomy of executable images and parsing PE headers. We will continue with PE parsing and will explore a few more interesting areas of a PE file. We will also explore easy ways to parse attributes and the various flags that Windows uses that are specific to PE files. Please remember to have the following programs installed before this Part 7: WinDbg, PE Explorer by Pavel.
Take the whole series!
System Requirements:
Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS.
Read more about Jonathan Reiter