Cyber Exploitation & Reverse Engineering

15 weeks, 25 hours / week

$4000.00 USD


What you'll learn

The Cyber Academy: Exploitation and Reverse Engineering

Are you ready to take your place on the front-lines of offensive cyber operations? Are you prepared to use your curiosity, creativity, resourcefulness, persistence, and teamwork to begin a new career in cyber? Are you ready for your first mission?

The Cyber Academy: Exploitation & Reverse Engineering focuses on key offensive skills. This 15 week program will start students on the path to becoming penetration testers or cyber operations professionals. Development of the program was funded, in part, by the United States Department of Defense, and the curriculum was designed in conjunction with DoD and industry experts.

In the project-based, learn-by-doing curriculum of The Cyber Academy: Exploitation & Reverse Engineering, students work through eleven tasks online in a private cloud environment with constant help, advice, and feedback from knowledgeable mentors and extensive online learning resources. The tasks are embedded in the realistic, but fictional, context of work as an entry-level employee of a government cyber operations agency.

Enrollment in this program is only open to graduates of The Cyber Academy: Defense program.

What you will do

The Cyber Academy: Exploitation & Reverse Engineering includes the following tasks:

  1. Analyze a suspicious file
  2. Analyze a related suspicious file
  3. Analyze the FTP credentials app
  4. Conduct OSINT analysis
  5. Develop a buffer overflow exploit
  6. Strengthen a buffer overflow exploit
  7. Evade antivirus
  8. Develop a custom malware payload
  9. Spearphish a company
  10. Exploit a company's database
  11. Attack a nation-state

Skills you will learn

You will learn key reverse engineering and exploitation skills including:

  • Reverse engineering unknown binary (executable) files
  • Conducting open source intelligence
  • Exploiting server, database, and application software
  • Developing custom exploits
  • Evading antivirus software
  • Spearphishing
  • Planning and conducting a complex attack

Cyber Exploitation & Reverse Engineering

2018-2019 Sessions

Program dates: Coming soon

The Cyber Exploitation & Reverse Engineering Program is only available to people who have completed the Cyber Defense program. Session dates will be announced when that program is near completion.


Need help?

Refund policy

Founder & Faculty

Finding a job in infosec

Learning how to network is a part of the program!

Professional positions in cybersecurity, though abundant, are relatively new and an established and trusted credentialing system to help employers identify talent and confirm proficiency simply does not exist. For this reason, a certificate or degree is not the first thing a recruiter looks for when filling a position in Cybersecurity. Instead, most positions are filled through referrals and recommendations. This means that networking is the most important aspect of your job search in the field.

As part of each Cyber Security Programs, our mentors and program directors introduce students to a network of key Cyber/Information Security professionals through conferences, online communities, events and other activities. Our goal is to help you find employment within 6 months of completing any of our Cyber/Information Security programs.

Apply today

Online, mentored courses

Our courses are entirely online, but they are not like any online courses you have ever seen. You will not be watching boring video lectures and taking tests; you will learn by doing with the help of knowledgeable mentors who are always available to provide meaningful advice and feedback on your work.

By using the site, you agree to our privacy policy and terms and conditions.