About the training:
Maria Markstedter is the CEO and founder of Azeria Labs, established in 2017 to provide advanced training to companies on binary exploitation, as well as identifying and defending security vulnerabilities on Arm devices. Azeria Labs also provides free public workshops that teach developers and security engineers about the security of Arm-based technologies.
In 2018, Maria was listed in Forbes 30 Under 30 and joined the review board of the Black Hat security conference.
Maria's research interests are in processor and OS security, defensive mitigations against binary exploits, and reverse engineering.
Packed with practical labs and hands-on examples, our AMR Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.
Our reverse engineering courses are based around a series of reverse engineering labs, ranging from pure reverse engineering of compiled binaries to offensive security-focused vulnerability discovery and vulnerability class hunting.
Disassemble and debug real-world applications
Perform vulnerability discovery and learn about different vulnerability classes
Understand control flow of real-world applications
Learn to use disassembly tools like Ghidra, radare2, Frida, and GDB
Prerequisites: RE concepts
What you get after the training:
itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile)
Practical skill to elevate your career to the next level
After-training consultancy and support
Expansion of your professional network in the cybersecurity industry
Stronger cybersecurity posture of your business