Reverse Engineering Professional
Are you looking to gain the theoretical and practical knowledge required to perform advanced reverse engineering of third-party software and malware on the assembly language level? The Reverse Engineering Professional Learning Path will teach you several methods to identify, isolate, and finally, analyze portions of code which are of high interest, as well as the most common Windows APIs utilized for file, memory, and registry manipulation by either software protections (such as packers) or malware. During the learning process, you will also get insights into the most common anti-reversing tricks, including different code obfuscation methods, and how to bypass them. The Reverse Engineering Professional Learning Path also prepares you for the eCRE exam and certification.
Learning path at a glance:
-Start from the basics up to highly technical chapters
-Learn about IA-32 CPU Architecture
-Learn about functions, stack frames, heaps, exceptions, important Ring3 Windows internal structures, PE file format
-Learn about important Ring3 Windows Internal Structures
-Learn different methods to locate the important algorithms
-Understand and bypass Anti-Reversing techniques
-Perform full manual unpacking on packed executables
-Practice-based course with dozens of guided exercises
-Challenge your mind with hardcore technical topics
Our world-renowned instructors are some of the most experienced professionals in the industry and created our content with your success in mind.
Certifications Learning Paths
Common Learning Path Questions
If you have a question you don't see on this list, please visit our Frequently Asked Questions page by clicking the button below. If you'd prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
What is a Learning Path?
Are all Learning Paths included with an INE subscription?