Reverse Engineering

YOU ARE THE FUTURE. Reverse engineering is a fascinating subject and is considered as the soul of hacking. Reverse Engineering is useful in many information security areas such as secure coding, secure software design, malware analysis, malware forensics, exploit analysis and development.

Reverse engineering requires a strong foundation in assembly language and is very addictive once you get a hang of it!

Reverse engineering is a critical set of techniques and tools for understanding what software is really all about. Formally, it is "the process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction". This allows us to visualize the software's structure, its ways of operation, and the features that drive its behavior. The techniques of analysis, and the application of automated tools for software examination, give us a reasonable way to comprehend the complexity of the software and to uncover its truth.

Reverse Engineering is a core skill set that has tremendous advantages in almost all fields related to Information Security. The CCR domains aim is to ensure that the person has thorough understanding of the system & an In-Depth knowledge of its architecture. This area also serves as a foundation for other specialty subjects like Malware Analysis and Exploit writing.

Job Roles

Reverse Engineer Secure Code Analyst
Malware Analyst Secure Code Engineer
Malware Researcher Exploit Researcher
Software Anti-Piracy Researcher Senior Software Security Auditor
Software Architecture Security Consultant Senior Security Developer
Application Security Researcher Code Review Analyst

Reverse Engineering Domains

The Reverse Engineering Lab exam is based on the following broad domains:

  1. Assembly Language Fundamentals
  2. Windows Internals
  3. Reversing basics
  4. Disassembling
  5. Debugging
  6. Getting on the battlefield
  7. Dot Net Cracking
  8. Java Reversing
  9. Secure Coding Principles


  1. Programming experience (minimum 6 months recommended)
  2. Assembly Language knowledge.
  3. Understanding of common executable file formats / Debugging Concepts.

Benefits for Professionals

Benefits for Employers

Gain recognition for your skills from the Central Cyber Registry Hands-on proven skills recognized by Central Cyber Registry mean less time in training and faster "business ready" professionals for your Information security needs
Exclusive access to Priority Job reference Network and Up to 3 Job Interviews on passing CCR Lab exams Hire with Confidence – Minimize your risks as you always hire the right people with right skills
Clean Exit Program empowers your business and ensures peace of mind as candidates will not risk violating the code of ethics Get connected with local law enforcement and Intelligence agencies to support them in various Cyber crime and related cases
Qualify to participate in exclusive cyber security projects open only for Central Cyber Registry professionals by various Government of India organizations Hiring from CCR gives your organization access to priority notifications from the Ring of Fire network, that constantly monitors Indian Cyberspace
Special benefits for entrepreneurs for start-ups in Information Security domain Gives your organization exclusive discounts on further training and Information Security events across India, supported by CCR
Special benefits for entrepreneurs for start-ups in Information Security domain Provides increased credibility for your organization when working with vendors, contractors and government organizations

For More Details Click Here