The Windows API Monitoring and Hooking module teaches practical monitoring, hooking, and logging techniques used in debugging, reverse engineering, malware analysis, and EDR development all with hands-on labs and a Splunk skills assessment.
Key outcomes include:
  • Trace API calls from user mode into the kernel
  • Hook APIs (IAT, inline/Detours, DLL) and log parameters / returns
  • Monitor via kernel / EDR drivers to detect token abuse and privilege escalation
  • Validate findings with hands-on assessment to query and analyze logged API activity
image