Information Sharing and Analysis Center

India's leading non-profit foundation advancing national cyber security and professional ethics at workplace


Reverse Engineer & Malware Analyst (ICREMA)

The ISAC Certified Reverse Engineer and Malware Analyst is a unique opportunity offered by ISAC to experienced cybersecurity enthusiasts to get trained in the beautiful and mesmerizing world of reversing and malware analysis.

The ISAC Certified Reverse Engineer and Malware Analyst Certification allows you to quickly start your career in this challenging, adventurous, and rewarding field with hands-on Instructor-led training and virtual labs.


Features & Benefits

ISAC Certification and Community

  • Get the Falcon level for your ISAC certification
  • Get exclusive access to ISAC Community
  • Enhance your profile credibility globally

30 Days Access to Cyberange Virtual Labs

  • Exclusive labs on Reverse Engineering and Malware Analysis
  • Get Multiple labs to practice the concepts
  • Cloud-based labs with new challenges added every month!


Get NSD Empaneled Today!

Learn everything to get started with Reverse Engineering and Malware Analysis

Day One

  • Initial Infection Vectors and Malware Discovery
  • Sandboxing Malware and Gathering Information From Runtime Analysis
  • Introduction  to the Portable Executable (PE) and Executable and Linkable format (ELF) File Format
  • Identifying Executable Metadata and Executable Packers
  • Assembly Language Primer

Day Two

  • Assembling a Toolkit for Effective Malware Analysis;
  • Examining Static Properties of Suspicious Programs;
  • Performing Behavioral Analysis of Malicious Windows Executables; 
  • Performing Static and Dynamic Code Analysis of Malicious Windows Executables;
  • Interacting with Malware in a Lab to Derive Additional Behavioral Characteristics

Day Three

  • Low-Level Software;
  • Program Structure;
  • Low-Level Perspectives;
  • Understanding Core x86 Assembly Concepts to Perform Malicious Code Analysis; 
  • Reversing Introduction; 
  • Registers and Flags; A Primer on Compilers and Compilation;
  • Identifying Key Assembly Logic Structures with a Disassembler; 
  • Following Program Control Flow to Understand Decision Points During Execution; 
  • Recognizing Common Malware Characteristics at the Windows API Level (Registry Manipulation, Keylogging, HTTP Communications, Droppers); 
  • Extending Assembly Knowledge to Include x64 Code Analysis

Day Four

  • Interacting with Malicious Websites to Assess the Nature of Their Threats;
  • Deobfuscating Malicious JavaScript Using Debuggers and Interpreters; 
  • Analyzing Suspicious PDF Files; 
  • Examining Malicious Microsoft Office Documents, Including Files with Macros; 
  • Analyzing Malicious RTF Document Files
  • Recognizing Packed Malware; 
  • Getting Started with Unpacking; 
  • Using Debuggers for Dumping Packed Malware from Memory; 
  • Analyzing Multi-Technology and File less Malware; 
  • Code Injection and API Hooking; Using Memory Forensics for Malware Analysis

Day Five

  • How Malware Detects Debuggers and Protects Embedded Data; 
  • Unpacking Malicious Software that Employs Process Hollowing; 
  • Bypassing the Attempts by Malware to Detect and Evade the Analysis Toolkit; 
  • Handling Code Misdirection Techniques, Including SEH and TLS Callbacks; 
  • Unpacking Malicious Executable by Anticipating the Packer’s Actions identifying and defeating anti-disassembly techniques, anti-debugging techniques, anti-VM techniques and code obfuscation.
  • Behavioral Malware Analysis; Dynamic Malware Analysis (Using a Debugger); 
  • Static Malware Analysis (Using a Disassembler); 
  • JavaScript Deobfuscation; 
  • PDF Document Analysis; 
  • Office Document Analysis; 
  • Memory Analysis; 
  • Reverse engineering higher level languages (Python, Java and .NET bytecode)

Course Benefits

The program covers a highly demanded skill and will open up opportunities for you to work with defense and intelligence organizations.

Get a strong foundation with this course in offensive security. From Hardware hacking to complex malware engineering, the program will give you a strong base.

Mastering the program will set you in the right direction with potential recruiters. Get jobs in cyber security faster!


Vivek Parikh

ISAC Certified Instructor
Email: vivek.p[at]
Vivek is a seasoned cyber security researcher and ISAC Certified Reverse Engineer and Malware Analyst. Vivek is the lead developer of Virtual Labs at Cyberange and a former product developer at VMWARE.

Batch start Dates: October, November, December 2021

The course is for seven days and is scheduled every month. The lectures for each month/batch will be held on the following dates:

October 2021

05:30 to 08:30 PM

  • 14th October
  • 18th October
  • 22nd October
  • 25th October
  • 29th October

Exam – 30th October 2021

November 2021

05:30 to 08:30 PM

  • 1st November
  • 8th November
  • 12th November
  • 15th November
  • 19th November

Exam – 20th November 2021

December 2021

05:30 to 08:30 PM

  • 1st December
  • 6th December
  • 15th December
  • 20th December
  • 24th December

Exam – 26th December 2021

You will get weekly assignments and research work to enhance your course understanding. 


Delivered online (Live Video sessions), 15 training hours in total.

Application Deadline

  • One day before the start date of class every month

Who Should Attend

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen malware analysis
  • Candidates studying digital forensics and incident response
  • Professionals focused on offensive security
  • Aspiring cyber security professionals
  • Military and police
  • Candidates focused on reverse engineering


The exam consists of hands-on challenges in which the candidates need to correctly answer a minimum of 60% of questions to clear the exam successfully. The exam is conducted on the last day of the course. If you miss attending the session, you can appear for the exam with the next batch. You get a total of three attempts at no additional cost.

What you get

Get 30 days access to Cyber Range Virtual Labs - Practice various scenarios in the cloud, in an exclusive private network only for you!

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.

Get listed in the National Security Database program at the Falcon level by completing the certification. 

Get certificate of completion at the end of training and earn the Falcon level by completing the lab exam!

30 Days Access to Cyber Range Virtual Labs

The ISAC Reverse Engineer and Malware Analyst is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple scenarios on the cloud exclusively for you.
Hands On Labs
Register for the
  • Certification
  • Plan