Ethical Hacking : The Art of Reverse Engineering
Course Description
Unlock the inner workings of software with our intensive 32-hours Reverse Engineering Foundations course. Designed for cybersecurity enthusiasts, IT students, and professionals aiming to deepen their technical skillset, this hands-on training introduces you to the essential tools, techniques, and real-world applications of reverse engineering.
From understanding executable file structures to analyzing malware and bypassing software protections, participants will explore the full lifecycle of binary analysis. Whether you’re aspiring to work in malware research, vulnerability analysis, or cybersecurity defense, this course provides a strong technical foundation in a practical, beginner-friendly format.
What you’ll learn in this course
By the end of this 32-hour program, participants will be able to:
• Understand the fundamentals and use cases of reverse engineering
• Analyze executable file formats such as PE and ELF
• Read and understand assembly code through disassembly tools
• Perform static and dynamic analysis on software binaries
• Use debugging tools like Ghidra, x64dbg, and OllyDbg
• Identify and unpack obfuscated or packed programs
• Analyze basic malware behavior and its techniques
• Explore beginner-level software cracking in a legal, ethical context
What you'll learn in this course?
By the end of this 32-hours program, participants will be able to: • Understand the fundamentals and use cases of reverse engineering • Analyze executable file formats such as PE and ELF • Read and understand assembly code through disassembly tools • Perform static and dynamic analysis on software binaries • Use debugging tools like Ghidra, x64dbg, and OllyDbg • Identify and unpack obfuscated or packed programs • Analyze basic malware behavior and its techniques • Explore beginner-level software cracking in a legal, ethical context
Course Curriculum
Durée :
4 HObjectives :
Learn what reverse engineering is and why it’s important in cybersecurity.
Discover where and how it’s used (e.g., malware analysis, software cracking).
Get an overview of key tools used in the field like Ghidra and x64dbg.
Durée :
4HObjectives :
Understand how program files are built and how the system reads them.
Learn about PE (Windows) and ELF (Linux) file formats.
Explore sections inside these files, like code, data, and metadata.
Durée :
4 HObjectives :
Get introduced to assembly language – the low-level code computers run.
Use disassemblers to turn program files into readable assembly code.
Understand basic instructions, registers, and memory access.
Durée :
4 HObjectives :
Analyze program files without running them to find hidden behavior.
Learn to read code, follow logic, and detect suspicious patterns.
Use tools like Ghidra to explore functions and strings.
Durée :
4 HObjectives :
Run programs safely to watch how they behave in real time.
Use debuggers to pause, step through, and inspect running code.
Learn to track changes in memory and registers during execution.
Durée :
4 HObjectives :
Understand how attackers hide code using packing or obfuscation.
Learn techniques to detect and unpack these binaries.
Explore basic unpacking methods and anti-debugging tricks.
Durée :
4 HObjectives :
Analyze real malware samples to see how they infect and spread.
Look at how they communicate, hide, and steal data.
Combine static and dynamic methods for full analysis.
Durée :
4 HObjectives :
Learn how basic software protection mechanisms work (like serial keys).
Understand how attackers try to bypass these protections.
Try beginner-level crackme challenges in a legal and educational context.
Discover ethical and legal boundaries of software reverse engineering
By