Useful Links
Computer Science
Cybersecurity
Reverse Engineering
1. Foundations of Reverse Engineering
2. Prerequisite Knowledge
3. Software Reverse Engineering
4. Hardware Reverse Engineering
5. Applications and Specializations
6. Anti-Reverse Engineering Techniques
7. Essential Tools and Techniques
Prerequisite Knowledge
Computer Architecture Fundamentals
Central Processing Unit (CPU)
CPU Structure and Components
Instruction Cycle
Registers and Flags
Pipeline Architecture
Cache Systems
Memory Hierarchy
RAM Types and Function
Cache Levels and Operation
Virtual vs. Physical Memory
Memory Management Units
Input/Output Systems
Peripheral Devices
Bus Architectures
Direct Memory Access (DMA)
Interrupt Handling
Instruction Set Architectures
CISC vs. RISC
Addressing Modes
Instruction Encoding
Operating System Concepts
Process Management
Process Lifecycle
Process Control Blocks
Context Switching
Inter-Process Communication
Thread Management
Threading Models
Thread Synchronization
Race Conditions
Memory Management
Virtual Memory Systems
Paging and Segmentation
Address Space Layout
Memory Protection
File Systems
File System Structures
File Permissions and Metadata
File System APIs
Directory Structures
System Calls and APIs
System Call Interface
Common Operating System APIs
User Mode vs. Kernel Mode
Privilege Escalation
Programming Languages
Low-Level Languages
Assembly Language
Syntax and Semantics
Assembler Directives
Macro Systems
Machine Code
Binary Instruction Encoding
Opcode Structure
High-Level Languages
C Programming
Memory Management
Pointer Arithmetic
Compilation Process
C++ Programming
Object-Oriented Features
Template Systems
Standard Template Library
Scripting Languages
Python for Automation
PowerShell Scripting
Bash Scripting
Data Structures and Algorithms
Basic Data Structures
Arrays and Lists
Stacks and Queues
Hash Tables
Advanced Data Structures
Trees and Graphs
Heaps and Priority Queues
Tries and Suffix Trees
Algorithm Analysis
Time and Space Complexity
Big O Notation
Algorithm Optimization
Common Algorithms
Sorting Algorithms
Searching Algorithms
Graph Algorithms
Networking Fundamentals
Network Models
OSI Model
TCP/IP Model
Protocol Stack Concepts
Internet Protocol Suite
IP Addressing and Subnetting
Routing and Switching
Network Address Translation
Common Protocols
HTTP and HTTPS
DNS Resolution
SMTP and Email Protocols
File Transfer Protocols
Remote Access Protocols
Network Security
Encryption and Authentication
Firewalls and Access Control
Network Monitoring
Previous
1. Foundations of Reverse Engineering
Go to top
Next
3. Software Reverse Engineering