Reverse Engineer (RE)
Learn everything to get started
Reverse Engineer
- Course Benefits
- Who Should Attend
- Use critical-thinking skills and creativity to look at patterns of normal behavior
- Identify network behavior anomalies
- Understand Hunting procedures
- Understand Cyber Kill chain
- Knowledge of correlation and monitoring tools
- In-depth knowledge of MITRE’s ATT&CK Framework
- Handle large volumes of data-sets
- Exposure to Threat Intelligence tools
- Exposure to Data analysis tools
- Exposure to SOAR
The course is best suited for:
- Security Researchers
- Students and Professionals keen in Forensics Investigations
Security Teams - Law Enforcement Agencies
- Military and police personnel
Rs. 59,999 + GST
Rs. 25,000 + GST (only for certification)
Reverse Engineer
- Availability : Monthly
- Level : 03
The Cyberverse Advantange
30 Days Access to Cyber Range Virtual Labs
Access to e-learning videos
Clean Exit Professional Ethics Certification
Profile in the National Security Database
Live Attacks
Instructor-Support
30 Days Cyber Range Virtual Labs
100% Practical Course
Empanelment at Falcon Level in NSD
Get Recorded Class Lectures
Exam Fee Included
Certificate Included
PROGRAM
Features & Benefits
ISAC ID Card
- Get the exclusive ISAC ID Card
- Enhance your profile credibility globally
- Eligible for NSD Empanelment
30 Days Access to Cyberange Virtual Labs
- Exclusive labs on bug bounty
- Real-world scenarios for practice
- Cloud-based labs with new challenges added every month!
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
BROWSE OUR PLANS
Rs.59,999+ GST
Live Instructor Led Sessions, Cyberange virtual lab access, Theory + Lab tests, Certification
Upcoming Events
You will get weekly assignments and research work to enhance your course understanding.Â
Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center
Program Modules
Assembly Language Fundamentals
- Assembly Language overview
- Introduction to Instructions
- Data Representation
- The Stack segment & Push & pop Instructions
 Windows Internals | 10%
- Stacks, Heaps and Data sections
- Kernel vs. User memory
- Virtual Memory and Paging
Reversing basics | 10%
- Foundations of Reversing
- Program Structure
- Defining the Win32 API
- Introduction to tools used
- Debugger: Ollydbg – Indepth
Disassembling | 15%
- Understanding the disassembly.
- Using a disassembler
- Program appearance and settings
- Working with dynamic link libraries
- Modifying Code, Data and Registers
Debugging | 15%
- Understanding Breakpoints
- dentifying program structures
- Introduction to IDA pro
- Using OllyDbg
Getting on the battlefield | 15%
- Sysinternal Tools
- Cracking VB Applications
- Cracking Delphi Applications
- Cracking C/ C++ Applications
- Walkthrough of cracking a
- commercial application
- Different Approaches
Dot Net Cracking | 5%
- Ground Rules
- Reversing .NET – Part 1 – Introduction
- Reversing .NET – Part 2 – Byte Patching
- Reversing .NET – Part 3 – Advanced Patching
Java Reversing | 5%
- Java based Application architecture
- Byte Code
- JVM
- Concepts of decompiling
- Cracking mobile applications
Secure Coding Principles | 5%
- Development process
- Top 10 secure coding practices
- Writing secure code
30 Days Access to Cyber Range Virtual Labs
The ISAC Industrial Security Professional is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.
Upcoming Events:
You will get weekly assignments and research work to enhance your course understanding.Â
Examination
Get NSD Empanelment Today!
Learn everything to get started Forensics Investigations.
What you get
Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!
Get access to course videos on the ISAC e-learning portal, updated regularly!
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.
Get listed in the National Security Database program at the Falcon level by completing the program.
Program Modules
Assembly Language Fundamentals
- Assembly Language overview
- Introduction to Instructions
- Data Representation
- The Stack segment & Push & pop Instructions
 Windows Internals | 10%
- Stacks, Heaps and Data sections
- Kernel vs. User memory
- Virtual Memory and Paging
Reversing basics | 10%
- Foundations of Reversing
- Program Structure
- Defining the Win32 API
- Introduction to tools used
- Debugger: Ollydbg – Indepth
Disassembling | 15%
- Understanding the disassembly.
- Using a disassembler
- Program appearance and settings
- Working with dynamic link libraries
- Modifying Code, Data and Registers
Debugging | 15%
- Understanding Breakpoints
- dentifying program structures
- Introduction to IDA pro
- Using OllyDbg
Getting on the battlefield | 15%
- Sysinternal Tools
- Cracking VB Applications
- Cracking Delphi Applications
- Cracking C/ C++ Applications
- Walkthrough of cracking a
- commercial application
- Different Approaches
Dot Net Cracking | 5%
- Ground Rules
- Reversing .NET – Part 1 – Introduction
- Reversing .NET – Part 2 – Byte Patching
- Reversing .NET – Part 3 – Advanced Patching
Java Reversing | 5%
- Java based Application architecture
- Byte Code
- JVM
- Concepts of decompiling
- Cracking mobile applications
Secure Coding Principles | 5%
- Development process
- Top 10 secure coding practices
- Writing secure code
Program Modules
Module 1 – Assembly Language Fundamentals
- Assembly Language overview
- Introduction to Instructions
- Data Representation
- The Stack segment & Push & pop Instructions
Module 2 – Windows Internals | 10%
- Stacks, Heaps and Data sections
- Kernel vs. User memory
- Data Loss prevention Systems (DLP)
- Virtual Memory and Paging
Module 3 – Reversing basics | 10%
- Foundations of Reversing
- Program Structure
- Defining the Win32 API
- Introduction to tools used
- Debugger: Ollydbg – Indepth
Module 4 – Disassembling | 15%
- Understanding the disassembly.
- Using a disassembler
- Program appearance and settings
- Working with dynamic link libraries
- Modifying Code, Data and Registers
Module-5: Debugging | 15%
- Understanding Breakpoints
- dentifying program structures
- Introduction to IDA pro
- Using OllyDbg
Module-6: Getting on the battlefield | 15%
- Sysinternal Tools
- Cracking VB Applications
- Cracking Delphi Applications
- Cracking C/ C++ Applications
- Walkthrough of cracking a
- commercial application
- Different Approaches
Module-7: Dot Net Cracking | 5%
- Ground Rules
- Reversing .NET – Part 1 – Introduction
- Reversing .NET – Part 2 – Byte Patching
- Reversing .NET – Part 3 – Advanced Patching
Module-8: Java Reversing | 5%
- Java based Application architecture
- Byte Code
- JVM
- Concepts of decompiling
- Cracking mobile applications
Module-9: Secure Coding Principles | 5%
- Development process
- Top 10 secure coding practices
- Cracking C/ C++ Applications
- Writing secure code