When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Getting Started with Reverse Engineering
Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. This course will teach you techniques for reversing binary code to identify program characteristics and behavior.

This Course Includes
pluralsight
4 (88 reviews )
3 hour 40 minutes
english
Online - Self Paced
core courses
pluralsight
About Getting Started with Reverse Engineering
The ability to reverse engineer binary code is an essential skill for anyone responsible for software security or
performing malware analysis, and it even plays a significant role in performing penetration tests and incident response. In this course, Getting Started with Reverse Engineering, you will gain the skills necessary to reverse engineer native code and determine program behavior. First, you will discover the basic elements of modern CPU architecture and the essentials of assembly language. Next, you will learn about native code, the portable executable file format and techniques to enrich your reverse engineering efforts. Finally, you will explore proficiency in the tools and techniques associated with performing static and dynamic reverse engineering to include IDA Pro and WinDbg. Throughout this course you will be able to follow along through comprehensive demonstrations and apply yourself through hands-on labs. By the end of this course, you will have the knowledge and skills necessary to reverse engineer native code binaries.
What You Will Learn?
- Course Overview : 1min.
- Introduction : 14mins.
- Assembly Basics : 33mins.
- Working with Native Code : 37mins.
- Using Debuggers : 37mins.
- Practical Assembly : 48mins.
- Reverse Engineering : 42mins.
- Conclusion : 4mins.