Let us help you find the training program you are looking for.

If you can't find what you are looking for, contact us, we'll help you find it. We have over 800 training programs to choose from.


Course Skill Level:


Course Duration:

3 day/s

  • Course Delivery Format:

    Live, instructor-led.

  • Course Category:

    Security & Cybersecurity

  • Course Code:


Who should attend & recommended skills:

Experienced developers with Java or Python

Who should attend & recommended skills

  • Programmers seeking to get started with reverse engineering for creating cybersecurity patches and tools
  • Java or Python knowledge: Basic (1-2 years’ experience)
  • Software developing: Basic (1-2 years’ experience)

About this course

Ghidra, an open-source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This course is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs.
You’ll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. You’ll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, you’ll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The course also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project.

Skills acquired & topics covered

  • By the end of this Ghidra course, you’ll have developed the skills you need to:
  • Harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks

Course breakdown / modules

  • The origin of the internet
  • The Deep Web
  • The Dark Web

  • Maintaining privacy on the Dark Web
  • Transacting on the Dark Web
  • Deep web emails – Onion Mail

  • What does the future of the Deep Web hold for us?
  • Dark Web markets
  • The TOR Project
  • Public interest in the Dark Web

  • Linux Distributions
  • Installing and using a Linux VM
  • What else can we do with a Linux VM?

  • What is Tor Browser?
  • Installing Tor on Linux
  • Tor Project recommendations on the safe use of Tor

  • What is Tails OS?
  • Tails OS installation prerequisites
  • Downloading Tails OS
  • Installing Tails OS

  • What is Whonix?
  • Whonix installation and prerequisites
  • Using Tor Browser with Whonix

  • What is Qubes OS?
  • Accessing the Dark Web with Qubes

  • The good and evil side of the Dark Web
  • Onion websites
  • Illegal sales on the Dark Web using Bitcoin

  • Online scams
  • Avoiding the risks on a Dark Web market
  • Dangers of the Dark Web

  • IT professionals
  • Business companies
  • Law enforcement agencies
  • Military organizations
  • Cybersecurity professionals