Certification Programmes

MCSI Certification

MRE - Certified Reverse Engineer

Reverse engineering is the process of extracting the knowledge or design of a system from its implementation. In software engineering, reverse engineering is the process of discovering the underlying algorithms and structures of a program, usually by analyzing its executable code. In cyber security, this is done to analyze malware and find vulnerabilities in software in order to protect networks from attacks (or sell zero-days).

There are a number of skills required in software reverse engineering. The first is a deep understanding of how software works – what each instruction does, what data structures are used, and how the program flows. The second is a strong technical skillset, including the ability to disassemble code, debug it, and understand assembly language. Finally, reverse engineers must have a good understanding of malicious code and common attack vectors.

A professional Reverse Engineer with MCSI qualifications is experienced in conducting static, dynamic, and behavioral analysis against sophisticated and modern malware.

MCSI's MRE Certification is globally respected and has helped many students land jobs as Malware Analysts. The certification proves that you have the competencies the industry is seeking, which will give you the confidence to apply for jobs worldwide.

Register Now Course Overview
Intermediate Level MCSI Certification Intermediate
ic-certificate Certification
ic-clock 600+ hours
cpe-points 227
ic-money US$450
No Expiry, No Renewals

Course Overview

"To understand malware, you have to think like an attacker. You have to understand how they operate, how they think, and what they're trying to accomplish. That's why reverse engineering is such a powerful tool in the fight against cyber-attacks. It allows us to see the world through the eyes of the enemy."

Reverse engineering is a process that is used to analyze and understand the inner workings of a software program or system. This process can be used to identify and fix security vulnerabilities, as well as to develop countermeasures against cyber-threat actors. By understanding how an attacker may attempt to exploit a system, organizations can take steps to secure their assets.

There are a number of tools and techniques that can be used for reverse engineering, including disassembling, decompiling, and debugging. In order to effectively reverse engineer a program, it is important to have a good understanding of how the program is structured and how it functions. This can be achieved through experience and practice, as well as by studying the program's code and available documentation.

MCSI MRE is the best course to learn software reverse engineering because it offers an in-depth, hands-on learning experience. The course is designed for students who want to become experts in reverse engineering software applications. Students will learn how to analyze and understand the inner workings of software applications, and how to create tools and techniques to disassemble, decompile, and reconstruct software.

The MCSI Reverse Engineering (MRE) certification will equip you with the skillset necessary to carry out the following tasks:

  • Employ a systematic approach to malware analysis
  • Perform static, dynamic and behavioral analysis
  • Deobfuscate protected malware samples
  • Manually decompile binaries back to C code
  • Produce descriptions of how APT samples work
  • Develop high-fidelity indicators of compromise (IOCs)

A malware analyst typically earns an annual salary of $70,000. However, with experience and expertise in this field, a malware analyst can earn up to $150,000 per year.

Knowledge, Skills and Abilities You Will Acquire

MCSI is one of the most respected and trusted names in cyber security education and training. Our certifications teach critical skills, knowledge and abilities needed to advance a career in cyber security. Our courses are comprehensive and up-to-date, and our instructors are experienced professionals who are dedicated to helping students learn. MCSI provides the real-world skills and knowledge you need to protect any organization from cyber threats.

  • Employ a systematic approach to malware analysis
  • Binary Classification

    Binary classification is the process of identifying a malware sample as being malicious or benign. It is a critical step in the reverse engineering process, as it allows analysts to focus on the more important tasks of understanding the malware's functionality and how it operates.

    PE format

    The Portable Executable (PE) format is the file format of executables, object code, and Dynamic Link Libraries (DLLs) in Microsoft Windows. It is a common standard across all versions of the Windows operating system.

    The PE format is composed of several headers and sections. The most important section is the executable header, which contains information about the image such as its size, entry point, and machine type. Sections contain data or resources that are loaded into memory when the image is executed.

    Classifying executables based on PE properties

    When you reverse engineer a binary, one of the first things you'll want to do is figure out what kind of executable it is. This is important because each type of executable has its own unique properties. In this post, we'll take a look at how to classify executables based on their PE properties.

    Writing automated scripts to scale parsing executable files

    The automation of parsing executable files in reverse engineering is important to scale the analysis of these files. Automation allows for the execution of scripts that can rapidly identify meaningful data in a large number of files. This is important as it allows for the identification of patterns and trends that may exist in a set of files. Automated parsing also allows for the identification of changes that may have occurred in a set of files, which can help in the identification of malware.

    Binary decomposition

    There are a few different ways to approach reverse engineering a binary. One common method is to break the binary down into its component parts and resources, and then analyse each one separately. This process is known as binary decomposition.

    This approach can be helpful when trying to understand how a binary works, or when trying to find specific pieces of information within the binary. It can also be used to identify malware or other malicious content.

    Developing YARA rules to detect known samples

    Developing YARA rules to detect known malware samples is an important step in protecting networks. YARA is a tool that enables you to create rules to detect malicious files. By creating rules that target known malware samples, you can quickly and easily identify these files on your system and take appropriate action.

  • Behavioral Analysis

    A behavioral analysis is the examination of how a malicious code or program operates and behaves when executed. This analysis is important in order to understand how the malware is likely to behave when it infects a system and to identify any malicious activity that it may be carrying out.

    Behavioral analysis can be carried out in a number of ways, including by monitoring the system resources that the malware uses, tracking its network activity, and examining the files and registry keys that it modifies.

    Sandboxing

    There are a few key reasons why sandboxing is used in malware analysis. One reason is that it allows for a controlled environment in which to study the malware. This controlled environment can help researchers to understand how the malware works, what it does, and how it can be stopped. Additionally, sandboxing can help protect other systems on the network from being infected by the malware. By studying the malware in a sandbox, researchers can often develop countermeasures that can help protect other systems from being infected.

    Network simulations

    Network simulations are used in malware analysis to recreate the network activity of a malicious program. This can help analysts understand how the malware works and how it spreads. Network simulations can also be used to test defenses against malware.

    Sysmon

    Sysmon provides event logging and system activity monitoring. This can be used for behavioral analysis to identify malicious or unauthorized activity on a system. Sysmon logs keystrokes, process creations, network connections, and more. This can be used to help identify malware or other malicious activity.

  • Memory Forensics

    Memory forensics is a key tool in malware analysis, because it allows you to capture and examine the state of a system's memory at any point in time. This can help you identify malicious code, track its execution, and understand how it interacts with the system.

    Volatility Framework

    The Volatility Framework is a set of tools for analyzing volatile memory (RAM) dumps. It can be used to detect and extract evidence from seized computers. In this course, you will learn how to analyse the following artefacts:

    • Windows registry
    • Processes and DLLs
    • Process memory
    • Kernel objects
    • Networking
    • GUI

    Detect code injection techniques

    Code injection is the process of placing executable code into another process' memory space. This can be done in a number of ways, but the most common is to use a programming language's built-in functions to write the code into memory. This code can then be executed by the target process, giving the attacker control over it. By detecting code injection in memory, forensic analysts can identify compromised systems and take steps to mitigate the risk.

    Using YARA to hunt for known malware across memory dumps

    YARA is a powerful tool that can be used to identify and hunt for known malware across memory dumps and other files. By using YARA rules, you can quickly and easily scan through large data sets to find specific malware signatures. This can be helpful in identifying and remediating an infection, as well as in conducting incident response investigations.

  • Static Analysis

    Disassembly is the process of breaking down a compiled program into its assembly code. This process can be used to understand what malicious code does. Decompilation is the reverse engineering of executable files to source code.

    This course will teach you how to use static code analysis techniques to uncover the code logic of malware.

    Topics Covered:

    • Mastering Ghidra
    • Automated and manual decompilation
    • Annotation, bookmarks, references
    • Analysing different types of PEs
    • Decrypting data and binaries
    • Programming to assist static analysis
  • Dynamic Analysis

    Dynamic Analysis is the process of executing a program in a controlled environment and observing the behavior of the program as it runs, often using a debugger. This technique is used to identify malware and uncover its functionality. Dynamic Analysis can be used to determine how a malware program interacts with the system and the files on the system. It can also be used to identify the malicious code in a program and reveal the activities of the malware.

    • Monitoring APIs
    • Defeating anti-debug techniques
    • Dynamically unpacking malware
    • Symbolic execution and emulation
    • Kernel-mode debugging
    • Programming to assist dynamic analysis
  • Introduction to code obfuscation techniques and how to deal with them

    Code obfuscation is a technique used to make code more difficult to understand. This can be done in a variety of ways, such as inserting nonsense code, renaming variables, or using complex mathematical formulas. Code obfuscation is used primarily to protect intellectual property, but it is also used by malware authors to frustrate reverse engineers.

    Control Flow Flattening

    Control flow flattening for code obfuscation is a technique used to make the code more difficult to understand. The idea is to take a complex code sequence and flatten it out into a series of simple steps. This makes it more difficult for reverse engineers to understand how the code works and extract malware features.

    Opaque Predicates

    In computer science, an opaque predicate is a predicate (a function that takes one or more arguments and returns a boolean value) that is not analyzable by a humans. In other words, it is a predicate whose behavior cannot be determined by inspecting its code. This can be used for code obfuscation, as it makes it harder for malware analysts to determine which functions are important and which are not.

    Mixed Boolean Arithmetic

    Mixed Boolean Arithmetic obfuscation (MBA) is a technique used to hide code from prying eyes. It combines simple algebra with bitwise operations to make the code difficult to read and understand. MBA is often used to protect copyrightable code, trade secrets, or sensitive information.

    Strings and Code Encryption

    Malware encrypts its strings and code to make it more difficult for security analysts and antivirus software to detect and remove the malicious software. By encrypting the strings and code, the malware can remain undetected for longer and cause more damage.

    Instruction substitution

    Instruction substitution is a technique often used in code obfuscation. It replaces certain machine instructions with others, in order to make the code harder to understand and follow.

  • How to write professional Malware Analysis Reports (MARs)

    Malware analysis reports (MARS) are documents created by analysts after they have performed a malware analysis. The report contains a detailed description of the malware, what it does, how it works, and any other information discovered about it.

    MARS are used to communicate the findings of a malware analysis to other members of the organization, as well as to law enforcement or other agencies if necessary. They can also be used as a reference for future investigations.

    Executive Summary

    An executive summary is a brief overview of a document. It is typically a few paragraphs long and is meant to give the reader a brief understanding of the document's contents. An executive summary is often used in reports, such as malware analysis reports, to provide a high-level overview of the report's findings.

    Sensitivity Classification

    A Sensitivity Classification is a key part of a malware analysis report because it helps to prioritize the data and analysis findings. The classification helps to identify the sensitivity of the data and whether or not it can be released to the public.

    Methodology

    When writing a malware analysis report, it is important to describe the methodology followed so that readers can understand how the analysis was conducted and what conclusions were drawn. This allows other researchers to build on the work that has been done, and it also helps to ensure that the analysis is reproducible. Additionally, describing the methodology can help to point out any potential flaws in the analysis.

    Limitations and constraints

    When writing a malware analysis report, it is important to list the limitations and constraints that were faced during the analysis. This will help others to understand any potential inaccuracies in the report. Additionally, it can help to identify any areas that may need further research. By acknowledging the limitations of the analysis, the author can provide a more accurate and complete report.

    Malware features and capabilities

    It is important to list all the malware features and capabilities discovered in order to give a comprehensive overview of the threat. This information can help security researchers and system administrators develop defenses against the threat and protect their networks and systems from attack. Additionally, by understanding the full range of capabilities of a piece of malware, investigators can more effectively track down its creators and distributors.

    Conclusions of Code Analysis and Observed Behavior

    When writing a malware analysis report, it is important to have a conclusion section. This section summarizes the key findings of the report, and can help to inform future defenses against the malware. Additionally, a conclusion section can help to ensure that the reader has a clear understanding of the report's findings.

  • How to analyze ransomware, Remote Access Tools (RATs) and APT toolkits with user and kernel mode components

Career Outcomes

This certification thoroughly prepares you for the following roles:

  • Cyber Defender
  • Incident Responder
  • Malware Analyst
Certification Detail

MCSI certifications are highly respected and sought-after credentials in the industry. Earning an MCSI certification is a testament to your knowledge and skillset, and demonstrates your commitment to excellence. The content is cutting-edge, uniquely-designed, and hands-on. Our exercises teach in-demand skills that are immediately applicable in the field.

The certifications are valid indefinitely and do not require any renewal fees. The training is accessible without any time limits.

Syllabus

Training Modules

This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.

  • MRE-QS-001: Quickstarter - 9 exercises
  • MRE-001: Lab Setup - 4 exercises
  • MRE-002: Fundamentals, Concepts, and Theory - 4 exercises
  • MRE-003: Programming for Reverse Engineering - 5 exercises
  • MRE-004: Windows Internals for Reverse Engineering - 7 exercises
  • MRE-101: Binary Classification - 9 exercises
  • MRE-102: Behavioral Analysis - 5 exercises
  • MRE-103: Memory Forensics for Malware Analysis - 6 exercises
  • MRE-104: Ghidra - 8 exercises
  • MRE-105: Malware in Documents - 2 exercises
  • MRE-201: Static Code Analysis - 10 exercises
  • MRE-202: Dynamic Code Analysis - 8 exercises
  • MRE-203: Symbolic Execution and Binary Emulation - 3 exercises
  • MRE-301: Manual Decompilation - 4 exercises
  • MRE-302: Code Deobfuscation - 13 exercises
  • MRE-303: Advanced Memory Forensics - 3 exercises

Scenarios

Cyber professionals must be ready for everything. The typical security training strategy, which focuses on individual skills and tools, is insufficient. You must be able to operate as part of a team, see the big picture, and respond swiftly and effectively to unforeseen circumstances. That's why, as part of our training, we use replays of whole cyber missions. Our scenarios help you prepare for the demands of the job and give you confidence in your ability to work professionally.

  • MRE-SC-01: Systematic Code Analysis - 5 exercises
  • MRE-SC-02: Systematic Approach to Malware Analysis - 7 exercises

Certifications

MCSI Industry Certifications are important for you to earn because they signify that you have the skills required to work in a cybersecurity. Certificates of Completion are also important to earn because they signify that you have completed an exercise. Earning Certificates of Completion and Industry Certifications demonstrates that you are willing to put in the extra work to be successful.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

MCSI's MRE certification covers all six levels of the Australian Signals Directorate's Cyber Skills Framework. You will achieve a certificate upon reaching each level. Click here to learn more.

ASD Skills Proficiency Level Curriculum Completion Requirement Scenarios Completion Requirement
MCSI Reverse Engineering Learner Level 1 0% 0%
MCSI Novice Reverse Engineer Level 2 20% 0%
MCSI Reverse Engineering Practitioner Level 3 50% 10%
MCSI Senior Reverse Engineering Practitioner Level 4 70% 30%
MCSI Certified Principal Reverse Engineer Practitioner Level 5 80% 50%
MCSI Certified Expert Reverse Engineering Practitioner Level 6 95% 75%

In a single course, MCSI offers multiple industry certifications. You will save time and money with us because you will receive several accredited levels of competencies with a single purchase rather than having to buy multiple courses. Our goal is to provide you with a course that will take you from beginner to expert.

Career Pathways

This certification aligns with the following career pathways:

Certifications are important tools to validate your skills and knowledge. They can provide you with the credentials you need to get ahead in your career.

There are many reasons why a person should select certifications that teach practical skills over an open-book theory exam. Hands-on experience is crucial in many industries, and theory exams cannot replace the real-world application of skills. Furthermore, practical skills are often more marketable than theoretical knowledge, and can help a person secure a job in their desired field. Finally, practical skills can provide a foundation for further learning, while theory exams may only teach limited information. In conclusion, selecting a certification that teaches practical skills is the best way to ensure success in today's competitive job market.

Sample Exercises

Below are three (3) exercises from the 100+ exercises available in MRE - Certified Reverse Engineer:

Decompile A Malicious Java Executable (Novice)

exercise

Defeat The Software Breakpoint Detection Anti-Debugging Technique (Advanced Beginner)

exercise

Perform A Manual Decompilation Of The BIRDDOG Malware (Competent)

exercise

Our Instructors

Student exercises are reviewed and graded by multiple instructors. This one-of-a-kind approach allows you to get highly personalized input from a number of successful professionals.

MCSI's teachers bring real-world experience and knowledge to the classroom, ensuring that students have the skills they need to excel in the field of information security. Due to their extensive experience in penetration testing, vulnerability assessment, reverse engineering, incident response, digital forensics, and exploit development, students will understand the most up-to-date defensive and offensive cybersecurity strategies and procedures.

Our instructors are passionate about information security and are always looking to further their own knowledge. Students who attend an MCSI course can be confident that they are learning from some of the best in the business. They can adapt their teaching approaches to match the demands of any student, regardless of their degree of expertise.

The MCSI team strives to provide the most comprehensive and up-to-date cybersecurity training available. Whether you are a seasoned security professional or new to the field, MCSI has a course that will meet your needs.

Received personalized feedback from cybersecurity experts:

  • Overcome challenges and hurdles preventing you from advancing your skills
  • Receive guidance on how to focus your training efforts and avoid wasting time
  • Learn how to meet the industry's quality standards and produce high-quality work
  • When you're stuck, go to a support forum or ask inquiries to the instructors right on the platform

Help and Support

Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.

Click here to see an example of personalized feedback.

To read a student's testimony about MCSI's feedback, click here.

Throughout the course, MCSI provides continuing support and assistance. Students have access to an online forum where they can communicate directly with the instructors. The exercises include a question form for students to ask for clarification, allowing them to get the most out of the course.

The exercises are written in a way that makes it clear what is expected of you. There is a description, specifications, guidelines, and quality expectations for each exercise. If you need more information, you can ask for it and expect a response within a few hours.

Whenever you encounter an exercise that could be improved, please contact us so that we can update it. Our catalog is kept very up-to-date, and students who propose enhancements typically receive a patch within one business day.

Actively Maintained Course

This course is actively maintained to ensure that it is current and error-free. We want to ensure that you have the best possible experience while taking this course, which includes having access to accurate and current information. This course is also tested for flaws on a regular basis, so you can be sure you're getting a high-quality product.

This course is constantly updated with the support of trustworthy industry peers to ensure that students are acquiring the most up-to-date information and skills. This dedication to staying ahead of the curve is what distinguishes this course as one of the greatest in the market.

Prerequisites

Training Laptop Requirement

This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:

  • 64-bit Intel i5/i7 2.0+ GHz processor or equivalent
  • 8GB of RAM
  • Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
  • Windows 10 or later, macOS 10 or later, or Linux
  • Local administrator privileges
Do you support older operating systems?

Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.

Proficiency in the English language

You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Programming Skills

We recommend that you have some experience in software programming prior to registering for this course. The preferred programming languages for this course include: Assembly, Python and C.

Lab Environment

This course teaches you how to setup and configure your own cybersecurity lab.

There are numerous advantages to creating your own cybersecurity lab rather than paying for one. The cost savings are perhaps the most evident benefit. When compared to the expense of licensing a pre-built lab, creating your own lab can save you thousands of dollars. You also have the option of customizing the lab environment to meet your specific requirements. You can, for example, select the hardware and software that will be used in your lab.

Another advantage of setting up your own cybersecurity lab is that it allows you to learn new skills. Building a lab from the ground up necessitates knowledge of networking, system administration, and other technical subjects. This experience is invaluable in your career as a cybersecurity professional.

We frequently see students who can complete a task in a pre-built lab but cannot complete the same task at work. This is because these labs are meant to lessen work complexity, thereby creating an illusion of personal capabilities. It's also worth noting that you'll be expected to set up your own lab to test tools and techniques in the workplace. Employers may give you the resources to set up virtual computers and networks, but it will be up to you to manage the lab environment and maintain your tools.

Finally, you should know that pre-built labs are not commonly licensed by top cybersecurity professionals. They've realized that setting up a lab is simple, efficient, adaptable, cost-effective, and that it sparks creativity. It also nullifies risk of performing unauthorized actions against systems provisioned by a third-party.

Aptitude Test (Optional)

This is an intermediate course. It includes exercises for novices but assumes that they have competent IT skills and a strong understanding of cybersecurity concepts.

Aptitude Test:

If you're not sure if you'll be able to fully enjoy this course, then contact us via email to organize a free aptitude test. This test will determine whether you meet the course's basic baseline criteria. If you've never studied with us before, it will also introduce you to the MCSI Method™.

Easier Courses:

If you are convinced that this course is too difficult for you, then you should start with something easier. We recommend checking out the following courses:

You won't need to complete all of these easier courses in their entirety. Most likely, you already have adequate skills and only need to fine-tune them before taking an intermediate course like this one. Choose a route, follow it, enhance your skills, and then return to this course in a few months!

Free Study Materials

Purchasing a course is a significant investment. It's critical to know what the course entails and what you intend to get out of it. If you're on the fence about whether or not to buy this course, you might want to check out our blog for more information. Concepts, terminology, and essential principles are all taught in our blog. This will give you more details about the topics that will be addressed in the course.

Click here to read more articles from our online library.

We place a major emphasis on teaching practical skills. Our students learn best when they can put what they've learned into practice. In addition, we believe that many significant thoughts and ideas should be publicly accessible to anyone. We believe that knowledge that is already available in the public domain should not be subject to price.

Testimonials

Why MCSI’s Reverse Engineering Certification is World Class

why MCSI certifications

Comprehensive, Effective, Exceeds Standards

Holders of the MRE Certification have completed 100 practical online exercises thus demonstrating that they have the skills and knowledge in the following areas: binary classification, static analysis, dynamic analysis, behavioral analysis, memory forensics and code deobfuscation.

why MCSI certifications

Internals Focused

Students who have obtained this Certification have demonstrated that they have a full understanding of the Windows operating system's internals for digital forensics, incident response and malware analysis purposes.

why MCSI certifications

Practical, Field-Based

Students must reverse engineer 20 malware samples. Many of which are APT toolkits discovered in the wild.

MCSI students have submitted over 14,000 practical online exercises since December 2018.

Enrolment and Fees

Fees

US$450 (+ GST if you're based in Australia).

Practical exercises must be completed online using MCSI's Online Learning Platform.

How to enrol

  • Step 1 - Login/Register for MCSI's Online Learning Platform
  • Step 2 - Click `Shop` from the left-side menu
  • Step 3 - Find the course, select `Buy` and proceed through the checkout process.

You can purchase the training using a Credit Card or PayPal. The training is immediately available.

Terms and Conditions

  • No discounts
  • No refunds
  • No transfers
  • No renewal fees
  • No hidden fees
  • No time limits

Cooling-Off Policy

Received a full refund if you changed your mind about a purchase within 24 hours. No questions asked. Read the full details here.

Don't Buy This Course

Don't buy this course if you think learning cyber security is simple, that it will only take a few hours, that remembering a few concepts from videos and books would be enough, or, that you should be provided with walkthroughs and solutions to practical problems instead of thinking critically for yourself.

Our competitors are misleading you by claiming that their video courses and open-book theoretical certificates will teach you everything you need to know about cyber security. We recommend that you stay away from our courses until you've realized that cybersecurity requires hundreds of hours of training against difficult challenges under the watchful eye of experts encouraging you to improve your weaknesses. Only then will you understand the value of this course and the benefits that the MCSI Method™ can bring to your career. We only want satisfied customers.

How does MCSI Compare?

If you are looking for a certification that will give you an edge in the job market, look no further than MCSI certifications. Thanks to our innovative approach, cybersecurity training is more affordable and effective than traditional methods.

MCSI Certifications Traditional Vendors Industry Conferences Conference Workshop Cybersecurity Bootcamps Cyber Ranges
Cost US$450 $5,000+ $900+ $4,000+ $10,000+ $3,000+
Hours of training 600+ hours 40-48 10+ 16-40 450 40-100
Certifications 5 1 0 0 1 0
Online Yes Some No No No Yes
practical 100% 50% 0% 50% 50% 100%
Maintenance Level High Low Low Low Low Low
free trial Yes No No No No No
Access to instructors Yes Some No Yes Yes Some

Our pricing is more affordable than our competitors because we have reinvented how cyber training is done online. Our innovative Online Learning Platform is highly effective at teaching cyber security. The platform provides a more engaging and interactive learning experience than traditional methods, which helps students learn and retain skills better. Try the free version and see for yourself.

Bloom's Taxonomy

Bloom's Taxonomy is a system for categorizing distinct stages of intellectual growth. It is used in education to assist students comprehend and learn material more effectively. MCSI teaches students how to apply, analyze, evaluate, and create at the highest levels of the taxonomy. The majority of our competitors are simply concerned with getting you to remember concepts.

The intellectual developments outlined in Bloom's Taxonomy are directly tied to your capacity to advance in your cyber security career. Employers look for people who can solve challenges that are worth paying for. With us, you'll learn practical skills that are in demand and applicable to a wide range of cyber occupations.

Industry Recognized Skills

MCSI credentials are well-respected around the world, and organisations searching for people with real cyber security abilities seek them out. Obtaining an MCSI certification verifies your understanding of critical cyber security topics as well as your ability to provide real-world results.

The ability of MCSI's training programme to give students with real-world, hands-on experience is unrivalled. Students must conduct their own research and develop their own answers in order to complete our practical exercises, which are meant to give them the skills they need to be successful in the field.

With MCSI, you will build a comprehensive cybersecurity portfolio of your skills as you complete exercises. This portfolio is a powerful tool for displaying your cybersecurity knowledge and abilities. A portfolio, as opposed to typical resumes and paper-based credentials, presents a more thorough summary of your skills and accomplishments.

Students Feedback

Here's what students say about the MCSI Method™ and our Online Learning Platform:

Student Testimonials

Information Security Professionals made a median salary of $103,590 in 2020. Cybersecurity roles are regularly ranked #1 jobs in the United States.

If you're interested in increasing your earning potential, investing in this course will give you the skills and confidence you need to apply for jobs that offer a salary of $75,000 to $150,000 per year. Why spend tens of thousands of dollars on degrees or theoretical certifications when you can develop in-demand practical skills in a shorter amount of time?

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • Are solutions included in certifications and bundles?
    • No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do the videos provides the answers to exercises?
    • No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
  • Do bundles, training content, or certificates ever expire? Am I expected to buy again in the future?
    • Upon purchase, bundles and certificates are permanently unlocked with no recurring or ongoing fees.
  • Do I need to buy the training and the certification separately?
    • No. The price provided covers both. You only pay once.
  • Do you offer any special offers and discounts?
    • We understand that many of our customers may be looking for discounts, and we would love to be able to offer them. However, we do not provide discounts because we believe that our prices are fair and reasonable. We work hard to keep our prices low, and we feel that discounts would be unfair to our other customers. We hope you understand.
  • If I can't solve the exercise where do I go for help?
  • Who reviews and marks exercises?
    • Trained cyber security instructors that work for Mossé Cyber Security Institute.
    • MCSI instructors are highly qualified and experienced professionals who are able to teach a variety of topics related to information security. They have the ability to tailor their teaching methods to meet the needs of each student, regardless of their experience level. In addition, they are always up-to-date on the latest trends and developments in information security, which enables them to provide students with the most relevant and current information.
  • We can't pay via credit card. Can you raise an invoice for international wire payment instead?
    • Yes. Send us the list of bundles and certifications you want to purchase at [email protected]
  • Can I access a trial/demo the certification programmes prior to enrolling?
    • We provide a free curriculum with 82 practical exercises you can try.
    • The Free Curriculum teaches Security Tools, Penetration Testing, Red Teaming, Threat Hunting, Cyber Defence, GRC and Windows Internals.
    • Try the Free Curriculum
  • What is an `Unofficial Curriculum`?
    • An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
    • We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
  • Do you provide Continuing Professional Education (CPE) credits?
    • Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
    • Novice exercises = 1 CPE credits
    • Advanced Beginner exercises = 2 CPE credits
    • Competent exercises = 5 CPE credits
    • Proficient exercises= 8 CPE credits
    • Beyond Proficient exercises = 16 CPE credits
  • Do I need to complete an exam to receive MCSI Certification?
    • No. MCSI Certifications are completed by solving practical cybersecurity exercises.
  • Do I need to purchase cybersecurity tools or subscriptions?
    • No. Only free or trial versions are used in our exercises. You do not require making any purchases.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Register Now