Reverse Engineering


Reverse Engineering is a critical skill. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field

Reverse Engineering Course Overview



Reverse engineering is a vitally important skill for today's expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today's ever evolving threats.

pre-study In this 5 day hands-on course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. You will learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary. After learning these important introductory skills, you will advance to the analysis of:

  • Hostile Code & Malware, including: Worms, Viruses, Trojans, Rootkits and Bots
  • Vulnerabilities in Binaries, including: Format string vulnerabilities, buffer overflow conditions, and the identification of flawed cryptographic schemes

  • Binary obfuscation schemes, used by: Hackers, Trojan writers and copy protection algorithms

Additionally you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET.

InfoSec Institute will train you on the standard reverse engineering programs IDA Pro, Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.


  • Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field.

  • Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.

  • Move beyond automated "input and output" testing of binaries, commonly used by fuzzers and other analysis tools.

  • More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.

Learn from Advanced Reversing Experts:
All of the instructors for InfoSec Institute's Reverse Engineering course active work in the field of incident response or security research. Our instructors have spoken at high-profile conferences (such as the Black Hat Briefings, the RSA Security Conference, and the Pentagon Security Forum) and industry events.

Other Reverse Engineering Courses
Advanced Reverse Engineering

Reverse Engineering Android

  • 90%+ Pass Rate
  • Top Reversing Certification Course
  • On-site exam proctoring
  • FREE Custom Reverse Tools Suite(details)
"Great instructor - thoroughly covered all topics with expertise. He focused our attention to the pertinent information. ... a great experience"

Jeremy J. Pearson,
Joint Staff, Pentagon

What You'll LEARN & DO

Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering.

Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them.

Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.

  • Understanding hashing functions
  • Working with encrypted binaries
  • Reversing UPX and other compression types
  • Discovering stack overflows
  • Discovering heap overflows
  • Creating a sandbox to isolate malware
  • Unpacking malware
  • Monitoring registry changes
  • Identifying malware communication channels
  • Understanding Digital Rights Management (DRM) implementations
  • Thwarting anti-debugger code
  • Debugging multi-threaded programs
  • Recursive traversal dissasemblers
  • Reversing .NET bytecode
  • CREA Review
  • Legal issues and the DMCA

  • Understanding conditional branching statements
  • Virtual machines and bytecode
  • System vs. Code Level reversing
  • Identifying variables
  • Compilers and branch prediction
  • Memory management
  • Win32 executable formats and image sections
  • Fundamentals of IDA Pro
  • Advanced uses of IDA Pro with hostile code
  • Using Ollydbg for runtime analysis of malware
  • Kernel mode debugging with SoftICE
  • Dumping executables from memory with Dumpbin
  • Locating undocumented APIs
  • Reversing ntdll.dll
  • Obfuscation of file formats

Dates & Locations

The best in the world come train with us

See what our students are saying

  • Mario Rodrguez

    U.S. ARMY

    "you have set the standard"

    "You have set the standard for instruction. Innovative and teaches you how to think through a problem with sound logic."

    Find out more
  • "...well worth the money"

    "It was fantastic! I learned more then i could have ever dreamed! even if I dont pass the exam the knowledge i got was well worth the money I spent!! and i had a good time leanring as well!"

    Find out more
  • "nice to have a dedicated training laptop provided"

    "I got a lot out of the real world scenarios presented in class. Jeremy is very knowledgeable in the field of penetration testing. Would definitely take classes again if he is the instructor. The course books are a great reference, and it was nice to have a dedicated training laptop provided by Infosec and not have to bring my own and waste time installing programs during class"

    Find out more
  • Rummy Dabgotra

    MTS Allstream

    "invaluable to my career"

    "Dan is an excellent instructor and incredibly knowledgeable. Great presenter and very helpful. The course was very intense but well structured. The hours were long but it really allows you to get your head wrapped around it. Slide notes were very good as well as the lab pre-info. The labs tied well into the course. The content and knowledge gained will be invaluable to my career."

    Find out more
Reverse Engineering Boot Camp Review By Paul Krell, Lead Cyber Security EngineerBroadcom
Rating: 5 out of 5.
A great instructor that certianly understands the material and brings a lot to the course.

Certifications & Compliance

Certified Reverse Engineering Analyst: 

In any hands on reverse engineer training course, it is important to have the opportunity to prove tocurrent or potential employers that you have the skills you say you do. This course prepares you for the top reverse engineering certification in the industry, the CREA. The exam is given on-site, InfoSec Institute has achieved a 93% pass rate for this certification. 

Pricing for thisReverse Engineering Course


Call (866)-471-0059 or fill out this short form for current pricing


  • FREE tools and software!

    InfoSec Institute's Custom Reversing Tools Enterprise Suite, includes every program covered in the course for at home study. (119 Tools).

  • Course Materials, Test Fees and Class Guarantees!

    Small class size provides intimate learning setting not offered at any of our competitors.

    5 Full Days of Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.

    All meals, snacks and refreshments included. Snacks not included in Las Vegas courses.

    Exam Fees included

    Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers hacking!

  • Available as a PACKAGE
      *Available Back-To-Back with Advanced Ethical Hacking, call for information on discount program 
      †Course available Back-To-Back with Computer Forensics Training, call for discounts

      Tuition Includes: 5 days of expert ethical network security training, 3 daily meals, text book, course book, lab manual, snacks, certified ethical hacker certification voucher)


Other Related Tools & Resources For Our Students

Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued education. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.

InfoSec Institute has an excellent instructor and this is the best IT security class I have ever taken. His knowledge and method of teaching are unsurpassed.