Reverse Engineer
& Malware Analyst
Reverse Engineer and Malware Analyst
is a unique opportunity offered by Cyberverse to experienced cybersecurity enthusiasts to get trained in the
beautiful and mesmerizing world of reversing and malware analysis.
Learn everything to get started with Reverse Engineering and Malware Analysis
- Course Benefits
- Who Should Attend
The program covers a highly demanded skill and will open up opportunities for you to work with defense and intelligence organizations.
Get a strong foundation with this course in offensive security. From Hardware hacking to complex malware engineering, the program will give you a strong base.
Mastering the program will set you in the right direction with potential recruiters. Get jobs in cyber security faster!
- Security Researchers
- Students and Professionals keen malware analysis
- Candidates studying digital forensics and incident response
- Professionals focused on offensive security
- Aspiring cyber security professionals
- Military and police
- Candidates focused on reverse engineering
The Cyberverse Advantange
30 Days Access to Cyber Range Virtual Labs
Access to e-learning videos
Clean Exit Professional Ethics Certification
Profile in the National Security Database
Reverse Engineer & Malware Analyst Certificate
Reverse Engineer & Malware Analyst ID Card
PROGRAM
Features & Benefits

Cyberverse Certification and NSD Falcon ID Card
- Get the Falcon level for your ISAC certification
- Get the exclusive NSD Falcon ID Card
- New CVE Guides every month
- Enhance your profile credibility globally

30 Days Access to Cyberange Virtual Labs
- Exclusive labs on Reverse Engineering and Malware Analysis
- Get Multiple labs to practice the concepts
- Cloud-based labs with new challenges added every month!
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
Our Batches
The course is for seven days and is scheduled every month. The lectures for each month/batch will be held on the following dates
14, 18, 22, 25, 29
1, 8, 12, 15, 19
1, 6, 15, 20, 24
Application Deadline :
One day before the start date of class every month
Program Modules
- Initial Infection Vectors and Malware Discovery
- Sandboxing Malware and Gathering Information From Runtime Analysis
- Introduction to the Portable Executable (PE) and Executable and Linkable format (ELF) File Format
- Identifying Executable Metadata and Executable Packers
- Assembly Language Primer
- Assembling a Toolkit for Effective Malware Analysis;
- Examining Static Properties of Suspicious Programs;
- Performing Behavioral Analysis of Malicious Windows Executables;
- Performing Static and Dynamic Code Analysis of Malicious Windows Executables;
- Interacting with Malware in a Lab to Derive Additional Behavioral Characteristics
- Low-Level Software;
- Program Structure;
- Low-Level Perspectives;
- Understanding Core x86 Assembly Concepts to Perform Malicious Code Analysis;
- Reversing Introduction;
- Registers and Flags; A Primer on Compilers and Compilation;
- Identifying Key Assembly Logic Structures with a Disassembler;
- Following Program Control Flow to Understand Decision Points During Execution;
- Recognizing Common Malware Characteristics at the Windows API Level (Registry Manipulation, Keylogging, HTTP Communications, Droppers);
- Extending Assembly Knowledge to Include x64 Code Analysis
- Interacting with Malicious Websites to Assess the Nature of Their Threats;
- DE obfuscating Malicious JavaScript Using Debuggers and Interpreters;
- Analyzing Suspicious PDF Files;
- Examining Malicious Microsoft Office Documents, Including Files with Macros;
- Analyzing Malicious RTF Document Files
- Recognizing Packed Malware;
- Getting Started with Unpacking;
- Using Debuggers for Dumping Packed Malware from Memory;
- Analyzing Multi-Technology and File less Malware;
- Code Injection and API Hooking; Using Memory Forensics for Malware Analysis
- How Malware Detects Debuggers and Protects Embedded Data;
- Unpacking Malicious Software that Employs Process Hollowing;
- Bypassing the Attempts by Malware to Detect and Evade the Analysis Toolkit;
- Handling Code Misdirection Techniques, Including SEH and TLS Callbacks;
- Unpacking Malicious Executable by Anticipating the Packer’s Actions identifying and defeating anti-disassembly techniques, anti-debugging techniques, anti-VM techniques and code obfuscation.
- Behavioral Malware Analysis; Dynamic Malware Analysis (Using a Debugger);
- Static Malware Analysis (Using a Disassembler);
- JavaScript Deobfuscation;
- PDF Document Analysis;
- Office Document Analysis;
- Memory Analysis;
- Reverse engineering higher level languages (Python, Java and .NET bytecode
Batch start Dates: October, November, December 2021
The course is for seven days and is scheduled every month. The lectures for each month/batch will be held on the following dates:
05:30 to 08:30 PM
- 1st December
- 6th December
- 15th December
- 20th December
- 24th December
Application Deadline: One day before the start date of class every month
- Security Researchers
- Students and Professionals keen malware analysis
- Candidates studying digital forensics and incident response
- Professionals focused on offensive security
- Aspiring cyber security professionals
- Military and police
- Candidates focused on reverse engineering
- The exam consists of hands-on challenges in which the candidates need to correctly answer a minimum of 60% of questions to clear the exam successfully. The exam is conducted on the last day of the course. If you miss attending the session, you can appear for the exam with the next batch. You get a total of three attempts at no additional cost.
Get NSD Empaneled Today!
Learn everything to get started with Reverse Engineering and Malware Analysis
Eligibility
Course Benefits
The program covers a highly demanded skill and will open up opportunities for you to work with defense and intelligence organizations.
Get a strong foundation with this course in offensive security. From Hardware hacking to complex malware engineering, the program will give you a strong base.
Mastering the program will set you in the right direction with potential recruiters. Get jobs in cyber security faster!
What you get
Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!
Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database. You can review the Bug Bounty Code of Conduct here.
Get listed in the National Security Database program at the Cadet level by completing the Bug Bounty Researcher certification. re.
Our Instructor

Vivek Parikh
ISAC Certified Instructor Email: vivek.p[at]cyberange.io Vivek is a seasoned cyber security researcher and ISAC Certified Reverse Engineer and Malware Analyst. Vivek is the lead developer of Virtual Labs at Cyberange and a former product developer at VMWARE.