This module examines in detail the techniques used to carry out evasive attacks, i.e., attacks designed to bypass defense systems. It presents code obfuscation techniques that make static and dynamic analysis more difficult, as well as evasion techniques used to distract or bypass dynamic analysis systems.
Would you like to attend the course live with the instructor?
