Reverse Engineer (RE)

Reverse engineering is a fascinating subject and is considered the soul of hacking. Reverse Engineering is useful in many information security areas such as secure coding, secure software design, malware analysis, malware forensics, exploit analysis and development.

Learn everything to get started
Reverse Engineer

Objectives
    1. Use critical-thinking skills and creativity to look at patterns of normal behavior
    2. Identify network behavior anomalies
    3. Understand Hunting procedures
    4. Understand Cyber Kill chain
    5. Knowledge of correlation and monitoring tools
    6. In-depth knowledge of MITRE’s ATT&CK Framework
    7. Handle large volumes of data-sets
    8. Exposure to Threat Intelligence tools
    9. Exposure to Data analysis tools
    10. Exposure to SOAR

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
    Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

Rs. 59,999 + GST
Rs. 25,000 + GST (only for certification)

Reverse Engineer

The Cyberverse Advantange

30 Days Access to Cyber Range Virtual Labs

Access to e-learning videos

Clean Exit Professional Ethics Certification

Profile in the National Security Database

Live Attacks

Instructor-Support

30 Days Cyber Range Virtual Labs

100% Practical Course

Empanelment at Falcon Level in NSD

Get Recorded Class Lectures

Exam Fee Included

Certificate Included

PROGRAM

Features & Benefits

ISAC ID Card

  • Get the exclusive ISAC ID Card
  • Enhance your profile credibility globally
  • Eligible for NSD Empanelment

30 Days Access to Cyberange Virtual Labs

  • Exclusive labs on bug bounty
  • Real-world scenarios for practice
  • Cloud-based labs with new challenges added every month!

VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION

BROWSE OUR PLANS

Select a plan which best suits you and earn your National Security Database Certification

Rs.59,999+ GST

Live Instructor Led Sessions, Cyberange virtual lab access, Theory + Lab tests, Certification

Rs. 25,000 + GST (only for certification)

Theory Test+ Lab Test

Upcoming Events
You will get weekly assignments and research work to enhance your course understanding. 

Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center

Program Modules

30 Days Access to Cyber Range Virtual Labs

The ISAC Industrial Security Professional is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.

Upcoming Events:

You will get weekly assignments and research work to enhance your course understanding. 

Examination

24 Hours Lab Exam under the Information Sharing and Analysis Center

Get NSD Empanelment Today!

Learn everything to get started Forensics Investigations.

What you get

30 Days Access to Cyber Range Virtual Labs

Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!

Access to e-learning videos

Get access to course videos on the ISAC e-learning portal, updated regularly!

Clean Exit Professional Ethics Certification

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.

Profile in the National Security Database

Get listed in the National Security Database program at the Falcon level by completing the program.

Program Modules

Program Modules

48 Hours Theory across 12 sessions (six weeks) with hands-on lab access for 60 days.

Module 1 – Assembly Language Fundamentals

  • Assembly Language overview
  • Introduction to Instructions
  • Data Representation
  • The Stack segment & Push & pop Instructions

Module 2 – Windows Internals | 10%

  • Stacks, Heaps and Data sections
  • Kernel vs. User memory
  • Data Loss prevention Systems (DLP)
  • Virtual Memory and Paging

Module 3 – Reversing basics | 10%

  • Foundations of Reversing
  • Program Structure
  • Defining the Win32 API
  • Introduction to tools used
  • Debugger: Ollydbg – Indepth

Module 4 – Disassembling | 15%

  • Understanding the disassembly.
  • Using a disassembler
  • Program appearance and settings
  • Working with dynamic link libraries
  • Modifying Code, Data and Registers

Module-5: Debugging | 15%

  • Understanding Breakpoints
  • dentifying program structures
  • Introduction to IDA pro
  • Using OllyDbg

Module-6: Getting on the battlefield | 15%

  • Sysinternal Tools
  • Cracking VB Applications
  • Cracking Delphi Applications
  • Cracking C/ C++ Applications
  • Walkthrough of cracking a
  • commercial application
  • Different Approaches

Module-7: Dot Net Cracking | 5%

  • Ground Rules
  • Reversing .NET – Part 1 – Introduction
  • Reversing .NET – Part 2 – Byte Patching
  • Reversing .NET – Part 3 – Advanced Patching

Module-8: Java Reversing | 5%

  • Java based Application architecture
  • Byte Code
  • JVM
  • Concepts of decompiling
  • Cracking mobile applications

Module-9: Secure Coding Principles | 5%

  • Development process
  • Top 10 secure coding practices
  • Cracking C/ C++ Applications
  • Writing secure code