Applied Reverse Engineering
A Hands-On Mini Bootcamp
We don't have any bootcamps scheduled at the moment.
Special Offer
$199 $25





Reverse engineering is a critical skill for malware analysts, SOC teams, and security researchers who need to understand how threats behave beyond alerts and signatures. This hands-on mini bootcamp focuses on practical reverse engineering techniques used to inspect binaries, analyze execution behavior, and translate findings into detection logic. Participants will work in controlled lab environments using industry-relevant tools to understand real-world malware behaviors through static and dynamic analysis.
What sets this training apart:
- Hands-On Reverse Engineering: Inspect and analyze real binaries
- Practical Lab Setup: Windows & Linux VMs with open-source tools
- Industry Tools in Action: Work with real-world RE & debugging tools
- Static & Dynamic Analysis: Understand malware before and during execution
- Malware Behavior Analysis: File, registry, process, and network actions
- Detection-Oriented Learning: Convert RE findings into YARA rules
Madhu
10+ Years of Experience
Threat Hunting | Digital Forensics | Incident Response | Malware Analysis
Madhukar is a cybersecurity expert with over a decade of experience in Threat Hunting, DFIR, Malware Analysis, and Incident Response. With deep expertise in adversary simulation and detection engineering, he brings real-world breach investigations and hands-on security research into practical, analyst-focused training sessions.
🔒 Limited Seats Available!
Secure Your Spot Now!
Module 1: Introductory Concepts for Reverse Engineering
- High-level executable lifecycle
- Lab Setup
- Setting up the RE environment
- Linux VM + Windows VM (isolated)
- Inspecting a binary:
- File type, architecture, hashes
- Basic triage mindset
Module 2: CPU Architecture & Assembly Essentials (x86/x64)
- How CPUs execute instructions
- Registers, stack, and memory layout
- Calling conventions (x86 vs x64)
- Control flow basics (jumps, calls, returns)
- Windows API
Module 3: Static Analysis Fundamentals
- PE/ELF structure overview
- Import tables and API resolution
- Recognizing suspicious patterns statistically
Module 4: Dynamic Analysis & Debugging Basics
- Breakpoints, stepping, memory inspection
- Understanding runtime behavior
- Anti-analysis basics
Module 5: Reverse Engineering Real-World Behaviors
- File system interaction
- Registry interaction
- Process creation and injection indicators
- Network behavior
- Writing Yara Rule for a malware sample
- Scanning filesystem for malware using Yara
- Scanning all running processes using Yara
Module 6: Mini Malware Reverse Engineering Challenge
- Structured RE workflow
- Reporting reverse engineering findings
- Translating RE output to detection logic
Pre-requisites
- Familiarity with a programming language, preferably C/C++, including basic concepts such as arrays, functions, and program flow.
*Note: No access to recorded sessions will be shared for this bootcamp.
Interested in Joining the
Our advisor will contact you with event details, and exclusive offers!