360€
306€
-15% (hasta el 30/04/2026)
* Becas y descuentos no aplicables a formación programada
- Presentación
- Temario
- Metodología
- Titulación
Descripción
¿A quién va dirigido?
This course is designed for IT professionals, software developers, and computer science graduates eager to deepen their understanding of reverse engineering and software cracking. It's ideal for those looking to enhance their skills and stay updated on current methodologies, without requiring advanced prior knowledge in the field.
Objetivos
- To understand the fundamentals of reverse engineering processes and techniques. - To identify and analyse software vulnerabilities and weaknesses. - To learn to decompile and examine binary code effectively. - To interpret assembly language for software analysis and debugging. - To explore various tools and methods for software cracking. - To apply reverse engineering skills to enhance software security. - To gain insights into ethical considerations and legal implications.
Salidas Profesionales
- Cybersecurity analyst specialising in vulnerability assessment - Malware analyst for security firms - Software developer with a focus on security patches - IT consultant for software protection strategies - Forensic analyst in digital crime investigation - Security researcher in software protection mechanisms - Reverse engineer for software development companies
Temario del Course on Reverse Engineering and Software Cracking
UNIT 1. INTRODUCTION TO ETHICAL HACKING
- What is ethical hacking?
- - Hacker ethics
- - Values of hacker ethics
- - Phases of ethical hacking
- - Types of ethical hacking
- Legal aspects of ethical hacking
- - Ethical hacking process
- - Code of ethics and certification
- Ethical hacker profiles
- - Black-hat hacker
- - White hat hacker
- - Gray hat hackers
- - Hacktivism
UNIT 2. PHASES OF ETHICAL HACKING IN ATTACKS ON SYSTEMS AND NETWORKS
- Types of attacks
- - Classification of attacks based on system vulnerabilities
- - Classification of attacks based on the effects caused
- - Classification of attacks based on the form of action
- Ethical hacking tools
- - Independent ethical hacking tools
- - Distributions for ethical hacking and security audits
- Vulnerability testing
- - Steps to configure a pentest laboratory
UNIT 3. PHASES OF ETHICAL HACKING IN ATTACKS ON WI-FI NETWORKS
- Types of attacks
- - DDoS attacks
- - Fake AP Rogue Attacks
- Ethical hacking tools
- Types of Wi-Fi Security
- - WEP Security
- - WPA Security
- - WPA2 Security
- - RADIUS Security
- Sniffing
UNIT 4. PHASES OF ETHICAL HACKING IN WEB ATTACKS
- Types of attacks
- - SQL Injection (SQLi) Attacks
- - XSS attacks
- Ethical hacking tools
- Types of web security
- Types of security tests in web environments
- - Identification of the proxy mechanisms used
- - Enumeration of valid hosts
- - Web server profiles
UNIT 5. INTRODUCTION TO REVERSE ENGINEERING
- Reverse engineering concept
- - Software engineering, re-engineering, and forward engineering
- - Characteristics of reverse engineering
- - Abstraction level
- - Completeness
- - Directionality in reverse engineering
- - The reverse engineering process
- - Restructuring
- - Redocumentation
- Advantages of using reverse engineering
UNIT 6. TYPES OF REVERSE ENGINEERING
- Reverse data engineering
- - Data reverse engineering techniques
- - Tools for reverse data engineering
- Reverse engineering of logic or process
- - Reverse engineering techniques for logic or processes
- Reverse engineering of user interfaces
- - Reverse engineering techniques for user interfaces
- - Reverse engineering work with user interfaces
UNIT 7. CRACKING TOOLS
- Debuggers
- - Fundamental concepts for understanding debuggers
- - Hardware support for debugging
- - Breakpoints
- - Debugging information
- - Anti-debugging techniques
- - Examples of debuggers
- Disassemblers
- - How disassemblers work
- - Disassembly methods
- - Anti-disassembly techniques
- - Examples of disassemblers by operating system
- Reverse compilers or decompilers
- - Compilation concept
- - Decompiler
- - Types of decompilers
- - Phases of decompilation
- - Decompiler tools
- - Examples of decompilers
- - Other tools
Metodología
EDUCA LXP se basa en 6 pilares
Item
Titulación del Course on Reverse Engineering and Software Cracking
Degree Issued and Endorsed by INESEM Business School. “Non-Official Education and Not Leading to the Award of an Official Degree or Certificate of Professionalism”.
INESEM Business School se ocupa también de la gestión de la Apostilla de la Haya, previa demanda del estudiante. Este sello garantiza la autenticidad de la firma del título en los 113 países suscritos al Convenio de la Haya sin necesidad de otra autenticación. El coste de esta gestión es de 65 euros. Si deseas más información contacta con nosotros en el 958 050 205 y resolveremos todas tus dudas.
Explora nuestras Áreas Formativas
Construye tu carrera profesional
Descubre nuestro amplio Catálogo Formativo, incluye programas de Cursos Superior, Expertos, Master Profesionales y Master Universitarios en las diferentes Áreas Formativas para impulsar tu carrera profesional.
Course on Reverse Engineering and Software Cracking
360€
306€
360€
306€