new
Academy
Enterprise
Defensive
Monitor & hook Windows APIs with a new Academy Module
The Windows API Monitoring and Hooking module teaches practical monitoring, hooking, and logging techniques used in debugging, reverse engineering, malware analysis, and EDR development all with hands-on labs and a Splunk skills assessment.
Key outcomes include:
- Trace API calls from user mode into the kernel
- Hook APIs (IAT, inline/Detours, DLL) and log parameters / returns
- Monitor via kernel / EDR drivers to detect token abuse and privilege escalation
- Validate findings with hands-on assessment to query and analyze logged API activity
