Don't second guess. Go with experience.

Intro to Reverse Engineering

CyberDefenses Academy


Available Upon Request - Contact us to request this course, or join the waitlist to be emailed when this product becomes available



Available on Request


Available on Request

Delivery Method



Certification of Completion

Audience / Level





Laptop required

Course Details

Program Introduction

This course provides anyone new to the world of reverse engineering and malicious code a high-level overview. The goal is to demystify the process and provide insight to anyone wishing to delve deeper into the realm of malicious code analysis. At the end of this course you will be able to identify different code structures, be able to describe how low-level computing works, and understanding the different mechanisms (threats) of the major types and a few subtypes of malware. You will also be able to tell a good in-depth malware report form a low-effort one with ease.

Course Objectives

  • It’s designed for those with an interest, but no background in RE.
  • It conveys the necessary concepts, principles and terms to lay down a solid foundation.
  • It is an introductory class on several tracks CDI offers for the professional starting out.

Target Student

Coming Soon.


Chris Rogers
Chris Rogers is a 20+ year industry security specialist who works with Cyberdefenses inc as the virtual security operations center team lead.Learn more about Chris Rogers

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Open and operate browsers
    • Find and use command line
    • Execute scripts
  • Prior Reverse Engineering or malicious code experience not required
  • Understanding of virtual machines (VM) and how to use one.
    • Understand how to import and power on a VM
Follow up this course with another one of CDI’s offerings:
  • File Interrogation
  • Reverse Engineering

Course Outline

  • Introduction
  • History of Reverse Engineering
    • Ancient World
    • Industrial Revolution
    • Modern Era
  • Code Structures and Models
    • High-level languages
    • Low-level languages
    • Machine-level languages
  • Enter the Matrix
    • How computers work
    • Dissassembler vs Debugger
The majority of the class’s “hands-on” modules & activities will take place in & after this point
  • Intro to Malcode
    • Types
    • Functions
    • Samples
  • Reading Reports
    • What makes a good report?
    • Asking the right questions
  • Wrap-up & Close

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.