Study any time, from any device.

Become a Certified Reverse Engineering Analyst (CREA)

The Certified Reverse Engineering Analyst (CREA) certification path teaches you the analysis skills needed to reverse engineer and analyze malware. You'll learn about how malware works, reversing different types of malware, common tools and more.

14 courses  //   85 videos  //   8 hours of training

Certified Reverse Engineering Analyst (CREA) training

This learning path builds your reverse engineering skills and prepares you to earn your Certified Reverse Engineering Analyst (CREA) certification. You’ll take a deep dive into reverse engineering, including different malware types, tools and techniques, as you progress through 14 courses tied to the primary CREA certification exam objectives. Upon completion, you’ll be prepared to earn your CREA certification and validate your knowledge around reverse engineering malware.

Learning path components

CREA Practice Exam
Practice Exam
CREA Practice Exam

CREA Practice Exam

Prepare for your CREA exam and test your domain knowledge.

Number of questions: 50

Introduction to Malware Analysis
Course
Introduction to Malware Analysis

Introduction to Malware Analysis

Explore malware analysis with a course covering static and dynamic analysis, tools, malware types and analysis methodologies.

5 videos
29 minutes of training

Introduction to Reverse Engineering
Course
Introduction to Reverse Engineering

Introduction to Reverse Engineering

Take a closer look at the art and science of reverse-engineering with a course on machine code, assembly language, system-level reversing and more.

5 videos
47 minutes of training

Disassembly
Course
Disassembly

Disassembly

Examine the intricacies of assembly and disassembly in an X86 context. Includes videos on arithmetic instructions, logical instructions and operands.

8 videos
48 minutes of training

Reversing Tools
Course
Reversing Tools

Reversing Tools

Explore the intricacies of multiple reversing tools, beginning with a close look at Interactive Dissasembler (IDA).

2 videos
33 minutes of training

C Code in Assembly
Course
C Code in Assembly

C Code in Assembly

Take a closer look at C code in assembly, including loops, linked lists, stacks and heaps.

6 videos
48 minutes of training

Windows Internals
Course
Windows Internals

Windows Internals

Explore the reverse-engineering of Windows with this course on Windows internals such as network APIs and services.

6 videos
34 minutes of training

Debugging
Course
Debugging

Debugging

A close and personal look at debugging, with nine videos taking you through stepping, breakpoints and exceptions and more. Includes in-depth examples.

9 videos
41 minutes of training

Common Malware Behavior
Course
Common Malware Behavior

Common Malware Behavior

Improve your malware-hunting skills with a course on injection types, network functions and other fundamentals of malware behavior.

15 videos
56 minutes of training

Reversing Rootkits
Course
Reversing Rootkits

Reversing Rootkits

Look more closely at the challenge of reversing rootkits with four videos on rootkit structure and behavior.

4 videos
11 minutes of training

Anti-Disassembly, Anti-Debugging and Anti-VM
Course
Anti-Disassembly, Anti-Debugging and Anti-VM

Anti-Disassembly, Anti-Debugging and Anti-VM

Malware doesn't want to be disassembled, and it's going to fight you. Seven videos examine anti-disassembly, anti-debugging and anti-VM strategies used by malware.

7 videos
31 minutes of training

Packed Malware
Course
Packed Malware

Packed Malware

Sometimes, malware is just hiding. Four videos examine the issue of packed malware, including tools, tricks and popular packers.

4 videos
17 minutes of training

Obfuscation, Encoding and Encryption
Course
Obfuscation, Encoding and Encryption

Obfuscation, Encoding and Encryption

Reintroduce yourself to three ways malware disguises itself: obfuscation, encoding and encryption.

8 videos
41 minutes of training

Reversing C++
Course
Reversing C++

Reversing C++

Our four-video course will reintroduce you to the art of reversing C++.

4 videos
28 minutes of training

Reversing 64-bit Malware
Course
Reversing 64-bit Malware

Reversing 64-bit Malware

Two videos take you through the ins and outs of reversing 64-bit malware, including functions, code samples and tools.

2 videos
14 minutes of training

 

What you’ll learn.

The CREA certification exam covers the following primary objectives:

  • Understanding hashing functions
  • Working with encrypted binaries
  • Reversing UPX and other compression types
  • Discovering stack overflows
  • Discovering heap overflows
  • Creating a sandbox to isolate malware
  • Unpacking malware
  • Monitoring registry changes
  • Identifying malware communication channels
  • Understanding Digital Rights Management (DRM) implementations

Who is this for?

A firm understanding of the Windows Operating System, computer architecture concepts and TCP/IP protocols are recommended. This certification path is designed for:

  • Malware analysts
  • Security researchers
  • Cybersecurity professionals looking to gain a technical understanding of malware
  • Anyone with a desire to get certified in reverse engineering!

You're in good company

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."

Val Vask

Commercial Technical Lead

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer