NSD Certified
Reverse Engineer (NCRE)
Reverse engineering is a 65 hours fascinating subject and is considered as the soul of hacking. Reverse Engineering is useful in many information security areas such as secure coding, secure software design, malware analysis, malware forensics, exploit analysis and development.
Program available on GeM.
Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.
Our advanced technical training program is available on demand for groups of at least 10 participants. For further details, please contact us.
Delivery Partner
Learn everything to get started Reverse Engineer.
Program Outline
- Assembly Language overview
- Introduction to Instructions
- Data Representation
- The Stack segment & Push & pop Instructions
- Stacks, Heaps and Data sections
- Kernel vs. User memory
- Virtual Memory and Paging
- Foundations of Reversing
- Program Structure
- Defining the Win32 API
- Introduction to tools used
- Debugger: Ollydbg – Indepth
- Understanding the disassembly.
- Using a disassembler
- Program appearance and settings
- Working with dynamic link libraries
- Modifying Code, Data and Registers
- Understanding Breakpoints
- dentifying program structures
- Introduction to IDA pro
- Using OllyDbg
- Sysinternal Tools
- Cracking VB Applications
- Cracking Delphi Applications
- Cracking C/ C++ Applications
- Walkthrough of cracking a
- commercial application
- Different Approaches
- Ground Rules
- Reversing .NET – Part 1 – Introduction
- Reversing .NET – Part 2 – Byte Patching
- Reversing .NET – Part 3 – Advanced Patching
- Java based Application architecture
- Byte Code
- JVM
- Concepts of decompiling
- Cracking mobile applications
- Development process
- Top 10 secure coding practices
- Writing secure code
Program Outcome
Gain proficiency in assembly language, Windows internals, and debugging, forming a strong foundation in reverse engineering essentials.
Learn and apply advanced disassembling and battlefield reversing techniques to identify vulnerabilities and potential exploits effectively.
Understand secure coding principles and reverse engineering in languages like .NET and Java, promoting secure software development and resilience against attacks.
The course is best suited for:
- Security Researchers
- Students and Professionals keen in Forensics Investigations
- Security Teams
- Law Enforcement Agencies
- Military and police personnel
What You Get
Get 60 days access to course videos on the e-learning portal
60 Day access to Cyberange Virtual Labs (ID/Password will be sent via email)
Get listed in the National Security Database program at the Falcon level by completing the program.
The Examination includes two free attempts, allowing candidates a second chance to improve their scores or deepen their understanding without additional costs. This benefit supports candidates in achieving certification with confidence and flexibility.
PROGRAM
Features & Benefits
Hands- On with Cyberange Virtual Labs
Get 60 Days access to Cyberange Virtual Labs for hands-on practice:
Penetration Testing Labs
Social Engineering Labs
Malware Labs
Cyber Forensic Labs
Password Cracking Labs
Bug Bounty Labs
