We’ve been hit, how can CyberDefenses help? Incident Hotline

Cyber Defenses Academy

Introduction to Reverse Engineering


Currently Unavailable - Join the waitlist to be emailed when this product becomes available

Product Description

Course Objectives

Through the user interactive labs the student will learn:

The course provides anyone new to the world of reverse engineering and malicious code a high-level overview.  The goal is to demystify the process and provide insight anyone wishing to delve deeper into the realm of malicious code analysis. At the end of this course you will be able to identify different code structures, be able to describe how low-level computing works, and understand the different mechanisms (threats) of the major types and a few subtypes of malware. You will also be able to tell a good in-depth malware report from a low effort one with ease.

Date & Time



CDI Academy
1205 Sam Bass Road, Suite 300
Round Rock, TX 78681
(512) 255-3700

Target Student

  • Individuals new to reverse engineering and with a need to understand its fundamentals
  • Professionals who deal with technical issues but feel they do not have enough background in how malicious code functions or is built
  • Technical professionals that need to be armed with greater knowledge of incident response, malware and the role it places in compromising companies

Your Instructor

Chris Rogers

Chris Rogers has over two decades of direct experience with technology and security.  Chris started off his career in DoD and continued that work with a number Fortune 50 companies. Chris has served in a diverse number of industry roles, including exploring experimental technologies, criminal forensics, intrusions, and investigations.

Additional Information

  • Laptop required
  • Requires basic knowledge of computers, technology and command line interface (CLI)
    • Assume students can open and operate browsers, find and use the command line, execute scripts and open programs
  • Prior Reverse Engineering or malicious code experience not required
  • Understanding of virtual machines (VM) and how to use one.
    • Assume students understand how to import and power on a VM

What’s Next

What’s next?

The following CDI courses are good follow-ups:


Certification of Completion

Course Outline

1) Introduction


2) History of Reverse Engineering

– Ancient World

– Industrial Revolution

– Modern Era


3) Code Structures and Models

– High level languages

– Low level languages

– Machine level Languages


4) Enter the Matrix

– How computers work

– Dissasembler vs Debugger


Due the dry nature of the first three topics the majority of the classes “hands on” modules and activities will take place in and after module 4.


5) Into to Malcode

– Types

– Functions

– Samples


6) Reading Reports

– What makes a good report?

– Asking the right questions as a customer.


7) Wrap up and Close

Additional Information

Why this course?

  • The course is designed for those with an interest but no background in RE. It conveys the necessary concepts, principles and terms to lay down a solid foundation.  If you have that requirement then it will serve your needs well.
  • The course is an introductory class on several tracks CDI offers for the professional starting out.


Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.