Description

Learn to detect potential vulnerabilities in your IT systems and apply the most appropriate reverse engineering techniques to work with total security” 

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class centre for intensive managerial skills training.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that combines the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.  
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives trained each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent. 
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea. 

TECH students represent more than 200 different nationalities.   
##IMAGE##
human icon

Learn with the best

In the classroom, TECH teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (a postgraduate learning methodology with the highest international rating) with the Case Study. A complex balance between tradition and state-of-the-art, within the context of the most demanding academic itinerary.  

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.  

At TECH, you will have access to the most rigorous and up-to-date case studies in the academic community”

Syllabus

The structure of this Postgraduate certificate in Reverse Engineering in Cybersecurity has been designed as a high-quality academic path where students will learn the most updated concepts in the field, from theory to practical application. This method enables students to learn autonomously, which is ideal for those who take online programs like this one, where students must self-manage their time and study.

This curriculum covers the main concepts and techniques used in Reverse Engineering in Cybersecurity” 

Syllabus

The Postgraduate certificate in Reverse Engineering in Cybersecurity is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments.


Throughout 150 hours of study, you will analyze a multitude of practical cases through individual work, which will allow you to acquire the necessary skills to develop successfully in your daily practice. It is, therefore, an authentic immersion in real business situations.

This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective.

A study plan designed especially for students, focused on their professional development, which prepares them to achieve excellence in the field of information security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the competencies to solve critical situations in a creative and efficient way. 

It is a program which is carried out in six weeks and is divided into one module: 

Module 1. Reverse Engineering

##IMAGE##

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate certificate in Reverse Engineering in Cybersecurity completely online. Over the course of 6 weeks, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.

Module 1. Reverse Engineering

1.1. Compilers

1.1.1. Types of Codes
1.1.2. Phases of a Compiler
1.1.3. Table of Symbols
1.1.4. Error Manager
1.1.5. GCC Compiler

1.2. Types of Analysis in Compilers

1.2.1. Lexical Analysis

1.2.1.1. Terminology. 
1.2.1.2. Lexical Components 
1.2.1.3. LEX Lexical Analyzer

1.2.2. Parsing

1.2.2.1. Context-free Grammars 
1.2.2.2. Types of Parsing 

1.2.2.2.1. Top-down Analysis 
1.2.2.2.2. Bottom-up Analysis 

1.2.2.3. Syntactic Trees and Derivations 
1.2.2.4. Types of Parsers 

1.2.2.4.1. LR (Left To Right) Analyzers 
1.2.2.4.2. LALR Analyzers

1.2.3. Semantic Analysis

1.2.3.1. Attribute Grammars 
1.2.3.2. S-attributes 
1.2.3.3. L-attributes

1.3. Data Structures in Assembler 

1.3.1. Variables
1.3.2. Arrays
1.3.3. Pointers
1.3.4. Structures
1.3.5. Objects

1.4. Assembler Code Structures 

1.4.1. Selection Structures

1.4.1.1. If, else if, Else 
1.4.1.2. Switch

1.4.2. Iteration Structures

1.4.2.1. For 
1.4.2.2. While 
1.4.2.3. Break Use

1.4.3. Functions

1.5. x86 Hardware Architecture

1.5.1. x86 Processor Architecture
1.5.2. x86 Data Structures
1.5.3. x86 Code Structures

1.6. ARM Hardware Architecture

1.6.1. ARM Processor Architecture
1.6.2. ARM Data Structures
1.6.3. ARM Code Structures

1.7. Static Code Analysis

1.7.1. Disassemblers
1.7.2. IDA
1.7.3. Code Rebuilders

1.8. Dynamic Code Analysis

1.8.1. Behavioral Analysis 

1.8.1.1. Communication 
1.8.1.2. Monitoring

1.8.2. Linux Code Debuggers
1.8.3. Windows Code Debuggers

1.9. Sandbox

1.9.1.  Sandbox Architecture
1.9.2. Sandbox Evasion
1.9.3. Detection Techniques
1.9.4. Avoidance Techniques
1.9.5. Countermeasures
1.9.6. Sandbox on Linux
1.9.7. Sandbox on Windows
1.9.8. Sandbox on MacOS
1.9.9. Sandbox on Android

1.10. Malware Analysis

1.10.1. Malware Analysis Methods
1.10.2. Malware Obfuscation Techniques

1.10.2.1. Executable Obfuscation 
1.10.2.2. Restriction of Execution Environments

1.10.3. Malware Analysis Tools

SemanasInternacionales TECH Global University

A unique education program that will help you reach the highest quality standards during the training” 

Postgraduate Certificate in Reverse Engineering in Cybersecurity

In the digital era in which we find ourselves, computer security has become one of the most critical aspects for any organization. Cyber attacks are becoming increasingly sophisticated, which makes it necessary to have highly trained professionals in the field. Under this premise, TECH Global University presents its Postgraduate Certificate in Reverse Engineering in Cybersecurity, a detailed look at the multiplicity of schemes that take place in this field. Here, we propose you an entirely online journey through various modules that encompass the identification, analysis and solution processes to the vulnerabilities that can occur in computer systems; through reverse engineering techniques. Through the curriculum, you will learn to use tools and methodologies to detect and exploit vulnerabilities, performing penetration tests and security audits. All of this will be broken down in self-regulated classes, reinforced with state-of-the-art multimedia material.

Why study reverse engineering in cybersecurity?

Considering that computer security has become one of the most critical aspects for any organization, it is important that you acquire the necessary knowledge to specialize in this field. By taking this TECH Postgraduate Certificate, you will have the opportunity to develop skills and competencies to detect vulnerabilities and perform security audits. Our faculty is made up of recognized specialists in the field, who will provide you with quality training, updated on the different topics that will be addressed in the program. The best of all is that the online mode will allow you to have greater flexibility in terms of schedules and access to content, adapting to your needs and allowing you to combine your studies with other activities. At the end of the program, you will be qualified to identify and solve vulnerabilities in computer systems, which will make you a highly valued professional in the modern labor market.