Course Overview

Reverse engineering is a crucial discipline in cybersecurity, malware analysis, and software development. It involves dissecting software binaries to understand how programs work internally, uncovering hidden functions, vulnerabilities, or protection mechanisms. Mastering reverse engineering equips professionals with the ability to debug, analyze, and secure software, making it essential for ethical hackers, penetration testers, and security researchers.

This course begins with foundational concepts, covering CPU and RAM fundamentals, assembly language, operating system internals, and an introduction to the Portable Executable format. It then explores widely used reversing tools. In the second part, learners dive into legal software protection reversing using tools like IDA Pro and OllyDbg. Topics include attacking password-protected software, serial fishing, bypassing serial checks, and integrity checks. Learners also gain insights into handling binaries created with Delphi, analyzing multi-threaded applications, and working with child processes.

This chapter-based course builds a solid base in reverse engineering, focusing on practical skills to analyze, manipulate, and understand software at a deeper level.

What You Will Learn

  • Introduction OS internals, memory structure, assembly language programming
  • Get to know about various software like IDA, OllyDbg
  • Learn about keygens, serial fishing, integrity checks and so much more!

Program Curriculum

  • CPU and RAM
  • Assembly Language
  • Operating System Internals
  • Portable Executable
  • Reversing Tools
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • IDA Pro
  • OllyDbg
  • Delphi
  • Attacking a Password Protected Software
  • Serial Fishing
  • Keygen
  • Adding Features to the Program
  • Serial Check Bypass
  • Integrity Checks
  • Multi-Threaded Applications
  • Child Processes
  • Chapter 2 Lab
  • Chapter 2 Quiz

Instructor

Abbas Naderi

Abbas Naderi is the founder and CIO of ZDResearch located in Virginia. He was a former software engineer at Google and has worked on technologies such as Reverse Engineering, Exploit Development, Kernel Development, NFS, Virtualization. Abbas has pursued his Master of Science (M.S) from Carnegie Mellon University and his PhD in Computer Science from the University of Virginia. His primary interest lies in Information Security, Cryptography, Game Development, Web Development and DevOps. Currently, he leads a team of world-class professional hackers. His tools and research have been presented at top academic and industrial conferences such as Black Hat, ACM CCS, Def Con, Kaspersky, etc. He is a 1st rank holder of NCCDC (US Hacking Championship) and 2nd rank holder of DARPA Cyber Grand Challenge.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 880+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 880+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 50