MCSI Certifications are world-class. The content is cutting-edge, uniquely-designed, hands-on and challenging. Our exercises teach in-demand skills that are immediately applicable in the field. MCSI's unique approach helps students around the world advance their careers.
This Certification has no expiry date. It has no renewal fees, no hidden fees, and is accessible with no time limits.
MCSI Certified Reverse Engineer:
Employ a systematic approach to malware analysis
Perform static, dynamic and behavioral analysis
Deobfuscate protected malware samples
Manually decompile binaries back to C code
Produce descriptions of how APT samples work
Develop high-fidelity indicators of compromise (IOCs)
Lab Setup - 4 exercises
Fundamentals, Concepts, and Theory - 4 exercises
Programming for Reverse Engineering - 5 exercises
Windows Internals for Reverse Engineering - 7 exercises
Binary Classification - 10 exercises
Behavioral Analysis - 5 exercises
Memory Forensics for Malware Analysis - 6 exercises
Ghidra - 8 exercises
Malware in Documents - 2 exercises
Static Code Analysis - 11 exercises
Dynamic Code Analysis - 8 exercises
Symbolic Execution and Binary Emulation - 3 exercises
Manual Decompilation - 4 exercises
Code Deobfuscation - 13 exercises
Advanced Memory Forensics - 3 exercises
Systematic Code Analysis - 5 exercises
Systematic Approach to Malware Analysis - 7 exercises
Below are three (3) exercises from the 100+ exercises available in MRE - Certified Reverse Engineer:
Decompile A Malicious Java Executable (Novice)
Defeat The Software Breakpoint Detection Anti-Debugging Technique (Advanced Beginner)
Perform A Manual Decompilation Of The BIRDDOG Malware (Competent)
Ability to comfortably read and understand IT documentation written in English. Ideally, an IELTS score of 6.5 with no band less than 6 (or equivalent).
Note: You can register for this course without having undertaken an English test.
We recommend that you have some experience in software programming prior to registering for this course.
The preferred programming languages for this course include: Assembly, Python and C.
Frequently Asked Questions
What is the MCSI Method™?
Are solutions included in certifications and bundles?
No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
Do the videos provides the answers to exercises?
No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
Do bundles, training content, or certificates ever expire? Am I expected to buy again in the future?
Once purchased, bundles and certificates are unlocked forever. They are no recurring or ongoing fees.
Do I need to buy the training and the certification separately?
No. The price provided covers both. You only pay once.
Do you offer any special offers and discounts?
If I can't solve the exercise where do I go for help?
We have an online forum where you can ask questions and our team of professional instructors will help you out.
An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
Do you provide Continuing Professional Education (CPE) credits?
Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
Novice exercises = 1 CPE credits
Advanced Beginner exercises = 2 CPE credits
Competent exercises = 5 CPE credits
Proficient exercises= 8 CPE credits
Beyond Proficient exercises = 16 CPE credits
Are MCSI courses/certifications recognized and have value outside of Australia?
Yes. MCSI certifications have value worldwide and are recognized by employers looking for individuals with practical cyber security skills.
MCSI's training is 100% practical with real cybersecurity problems designed to teach immediately applicable skills in the field. To solve our practical exercises, students must do their own research and develop their own solutions.
While completing exercises, students also develop their own comprehensive cybersecurity portfolio of skills. Individuals use this portfolio to demonstrate their cybersecurity competencies to solve real industry problems to future employers or hiring managers.
Do I need to complete an exam to receive MCSI Certification?
No. MCSI Certifications are completed by solving practical cybersecurity exercises.
This certification successfully prepares you for the following
Training Curriculum and Certifications
Students unlock Certificates of Completion for every exercise they complete. Industry Certifications are unlocked upon achieving Skills Proficiency Milestones.
Obtain CPE points by solving exercises
Achieve multiple certifications
Receive help from instructors online
MCSI's MRE certification covers all six levels of the Australian Signals Directorate's Cyber Skills Framework. You will achieve a certificate upon reaching each level. You will earn an industry certification at Level 5. Click here to learn more.
ASD Skills Proficiency Level
Curriculum Completion Requirement
Scenarios Completion Requirement
MCSI Reverse Engineering Learner
MCSI Novice Reverse Engineer
MCSI Reverse Engineering Practitioner
MCSI Senior Reverse Engineering Practitioner
MCSI Certified Principal Reverse Engineer Practitioner
As an MCSI Certified Reverse Engineer you will be fully capable of performing the following:
Employing a systematic approach to malware analysis
Classifying executables based on PE properties
Developing YARA rules to detect known samples
Writing scripts to parse PE files
Processes and DLLs
Automated and manual decompilation
Annotation, bookmarks, references
Analysing different types of PEs
Decrypting data and binaries
Programming to assist static analysis
Defeating anti-debug techniques
Dynamically unpacking malware
Symbolic execution and emulation
Programming to assist dynamic analysis
Basic Code Deobfuscation Techniques
Control Flow Flattening
Mixed Boolean Arithmetic
Strings and Code Encryption
Abusing Windows APIs
Analyse Ransomware, Remote Access Tools (RATs) and APT toolkits with user and kernel mode components
The MRE is the best reverse engineering training ever. Everything is hands-on and practical, just like Reverse Engineering should be. The training taught me so many new techniques to perform in-depth reverse engineering in the field.
Reverse Engineer, Financial Services
I learnt practical skills to perform malware analysis that I have never learnt before. The advanced technical concepts and skills taught are fantastic. I recommend this to anyone interested in malware analysis.
Malware Analyst, Financial Services
When I enrolled in the MRE I was blown away, so I immediately enrolled the rest of my team. Each exercise is exactly like something I would do as a Reverse Engineer providing an amazing method of learning. Excellent work MCSI!
Why MCSI’s Reverse Engineering Certification is World Class
Comprehensive, Effective, Exceeds Standards
Holders of the MRE Certification have completed 100 practical online exercises thus demonstrating that they have the skills and knowledge in the following areas: binary classification, static analysis, dynamic analysis, behavioral analysis, memory forensics and code deobfuscation.
Students who have obtained this Certification have demonstrated that they have a full understanding of the Windows operating system's internals for digital forensics, incident response and malware analysis purposes.
Students must reverse engineer 20 malware samples. Many of which are APT toolkits discovered in the wild.