Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.

NSD Empaneled ISAC Certified

Reverse Engineer (ICRE)


Reverse engineering is a 65 hours fascinating subject and is considered as the soul of hacking. Reverse Engineering is useful in many information security areas such as secure coding, secure software design, malware analysis, malware forensics, exploit analysis and development.

Program available on GeM.

Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.​

Our advanced technical training program is available on demand for groups of at least 10 participants. For further details, please contact us.

Learn everything to get started Reverse Engineer.

Program Outline

  • Assembly Language overview
  • Introduction to Instructions
  • Data Representation
  • The Stack segment & Push & pop Instructions
  • Stacks, Heaps and Data sections
  • Kernel vs. User memory
  • Virtual Memory and Paging
  • Foundations of Reversing
  • Program Structure
  • Defining the Win32 API
  • Introduction to tools used
  • Debugger: Ollydbg – Indepth
  • Understanding the disassembly.
  • Using a disassembler
  • Program appearance and settings
  • Working with dynamic link libraries
  • Modifying Code, Data and Registers
  • Understanding Breakpoints
  • dentifying program structures
  • Introduction to IDA pro
  • Using OllyDbg
  • Sysinternal Tools
  • Cracking VB Applications
  • Cracking Delphi Applications
  • Cracking C/ C++ Applications
  • Walkthrough of cracking a
  • commercial application
  • Different Approaches
  • Ground Rules
  • Reversing .NET – Part 1 – Introduction
  • Reversing .NET – Part 2 – Byte Patching
  • Reversing .NET – Part 3 – Advanced Patching
  • Java based Application architecture
  • Byte Code
  • JVM
  • Concepts of decompiling
  • Cracking mobile applications
  • Development process
  • Top 10 secure coding practices
  • Writing secure code

Program Outcome

Gain proficiency in assembly language, Windows internals, and debugging, forming a strong foundation in reverse engineering essentials.

Learn and apply advanced disassembling and battlefield reversing techniques to identify vulnerabilities and potential exploits effectively.

Understand secure coding principles and reverse engineering in languages like .NET and Java, promoting secure software development and resilience against attacks.

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

What You Get

Live instructor led sessions
The live interactive sessions are conducted by the industry experts
Access to e-learning videos

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

Access to Cyberange Virtual Labs

60 Day access to Cyberange Virtual Labs (ID/Password will be sent via email)

ISAC Certified Reverse Engineer Certification

Eligible to be empaneled in National Security Database

Get listed in the National Security Database program at the Falcon level by completing the program.

Complimentary attempts to pass

The Examination includes two free attempts, allowing candidates a second chance to improve their scores or deepen their understanding without additional costs. This benefit supports candidates in achieving certification with confidence and flexibility.

Complimentary access to the ISAC Members ICBIS community

Enjoy complimentary access to the exclusive ISAC Members ICBIS community, connecting you with industry experts and peers. Engage in valuable discussions, share insights, and stay updated on the latest in Cyber Security.

PROGRAM

Features & Benefits

ISAC Community

Get access to the exclusive ISAC Community. Enhance your profile credibility globally. 

Know More

60 Days Access to Cyberange Virtual Labs

Help the victims of cybercrimes. Be a part of a global community and Get Recognition.

Know More

Hands- On with Cyberange Virtual Labs

Get 60 Days access to Cyberange Virtual Labs for hands-on practice:
  • Penetration Testing Labs
  • Social Engineering Labs
  • Malware Labs
  • Cyber Forensic Labs
  • Password Cracking Labs
  • Bug Bounty Labs
Learn cyber security basics practically with your Instructor with our cloud labs!