EM305 Reverse engineering
Duration: 5 days
The nature of many software platforms leaves the functionality, and even source code, of programs exposed, even if the programs have been properly compiled. In this module, we will look at common techniques and approaches that are used in the industry to analyze compiled programs, and to reverse engineer them to either source code or some other meaningful format that will help to find out their inner functionality. Likewise, we will look at possible ways to counter such reverse engineering and will make an attempt to protect our programs as much as possible.
Emerge Trainings acknowledges your hard work. All participants that complete this training receive a Certificate of Completion. Depending on the training solution that your company has selected, morning and afternoon snacks, lunch, cloud servers, student manuals and venue may also be included.
The inclusions may vary for public and private training runs.
All Emerge trainings can be conducted in different locations globally.
For public trainings, the venue details will be included in the announcement for the training run. The training venue could be in Emerge Training rooms, shared facilities, hotels, conference rooms, event places, academic computer rooms and/or other similar venues.
For private trainings, the venue will depend on the company’s preference. Companies may choose hotels, event places, on-premise training rooms and conference rooms. Trainings could also be conducted in a virtual classroom.