mobile-banner
Applied Reverse Engineering A Hands-On Mini Bootcamp

Applied Reverse Engineering
A Hands-On Mini Bootcamp

21-22 March 2026
07:00 PM - 11:00 PM (IST)

We don't have any bootcamps scheduled at the moment.

8 CPEs
Hands-On
Malware-Focused Analysis
Tool-driven

Special Offer

$199 $25
Request a Bootcamp
Why Attend?

Reverse engineering is a critical skill for malware analysts, SOC teams, and security researchers who need to understand how threats behave beyond alerts and signatures. This hands-on mini bootcamp focuses on practical reverse engineering techniques used to inspect binaries, analyze execution behavior, and translate findings into detection logic. Participants will work in controlled lab environments using industry-relevant tools to understand real-world malware behaviors through static and dynamic analysis.

What sets this training apart:

  • Hands-On Reverse Engineering: Inspect and analyze real binaries
  • Practical Lab Setup: Windows & Linux VMs with open-source tools
  • Industry Tools in Action: Work with real-world RE & debugging tools
  • Static & Dynamic Analysis: Understand malware before and during execution
  • Malware Behavior Analysis: File, registry, process, and network actions
  • Detection-Oriented Learning: Convert RE findings into YARA rules
Meet the Expert

Madhu

10+ Years of Experience

Threat Hunting | Digital Forensics | Incident Response | Malware Analysis

Madhukar is a cybersecurity expert with over a decade of experience in Threat Hunting, DFIR, Malware Analysis, and Incident Response. With deep expertise in adversary simulation and detection engineering, he brings real-world breach investigations and hands-on security research into practical, analyst-focused training sessions.

🔒 Limited Seats Available!

Secure Your Spot Now!

Request a Bootcamp
Agenda
Day 1 | 21 March

Module 1: Introductory Concepts for Reverse Engineering

  • High-level executable lifecycle
  • Lab Setup
  • Setting up the RE environment
  • Linux VM + Windows VM (isolated)
  • Inspecting a binary:
    • File type, architecture, hashes
    • Basic triage mindset

Module 2: CPU Architecture & Assembly Essentials (x86/x64)

  • How CPUs execute instructions
  • Registers, stack, and memory layout
  • Calling conventions (x86 vs x64)
  • Control flow basics (jumps, calls, returns)
  • Windows API

Module 3: Static Analysis Fundamentals

  • PE/ELF structure overview
  • Import tables and API resolution
  • Recognizing suspicious patterns statistically
Day 2 | 22 March

Module 4: Dynamic Analysis & Debugging Basics

  • Breakpoints, stepping, memory inspection
  • Understanding runtime behavior
  • Anti-analysis basics

Module 5: Reverse Engineering Real-World Behaviors

  • File system interaction
  • Registry interaction
  • Process creation and injection indicators
  • Network behavior
  • Writing Yara Rule for a malware sample
  • Scanning filesystem for malware using Yara
  • Scanning all running processes using Yara

Module 6: Mini Malware Reverse Engineering Challenge

  • Structured RE workflow
  • Reporting reverse engineering findings
  • Translating RE output to detection logic

Pre-requisites

  • Familiarity with a programming language, preferably C/C++, including basic concepts such as arrays, functions, and program flow.

*Note: No access to recorded sessions will be shared for this bootcamp.

Key Takeaways
Earn 8 CPE Credits
Strong foundation in reverse engineering concepts
Hands-on experience with static and dynamic analysis
Practical understanding of malware behavior
Ability to write YARA rules from RE findings
Real-world reverse engineering workflow exposure

Interested in Joining the

Bootcamp?

Please Fill the Form

Our advisor will contact you with event details, and exclusive offers!