CYBR470 — Reverse Engineering

3 credits Catalog-Derived

Software reverse engineering of binaries. Tools include disassemblers, debuggers, and decompilers for malware analysis and vulnerability discovery.

5
Objectives
40
Matches
40
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
54.7% Software Quality Assurance Analysts 21t
66.1% Information Security Engineers 18t
60.3% Penetration Testers 17t
66.3% Computer Systems Engineers/Architec 14t
50.4% Web Administrators 13t

Learning Objectives & Matches

LO1

Disassemble and analyze binary executable code using tools like IDA Pro and Ghidra

10 O*NET task matches
Batch:
Software Quality Assurance Ana 3.7/5
45% ok

Perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.

Claude Opus 4.6 approved at 200
Biostatisticians 4.3/5
42% ok

Write program code to analyze data with statistical analysis software.

Claude Opus 4.6 denied
Software Quality Assurance Ana 4.0/5
39% ok

Monitor program performance to ensure efficient and problem-free operations.

Claude Opus 4.6 denied
Digital Forensics Analysts
38% ok

Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.

Claude Opus 4.6 denied
Web Developers 4.1/5
37% ok

Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.

Claude Opus 4.6 denied
Digital Forensics Analysts
36% ok

Perform forensic investigations of operating or file systems.

Claude Opus 4.6 denied
Software Quality Assurance Ana 4.7/5
35% ok

Identify, analyze, and document problems with program function, output, online screen, or content.

Claude Opus 4.6 denied
Data Scientists
35% ok

Clean and manipulate raw data using statistical software.

Claude Opus 4.6 denied
Database Administrators 3.7/5
33% ok

Test programs or databases, correct errors, and make necessary modifications.

Claude Opus 4.6 denied
Database Architects 3.6/5
33% ok

Test programs or databases, correct errors, and make necessary modifications.

Claude Opus 4.6 denied
LO2

Reverse engineer malware samples to understand functionality and extract indicators of compromise

10 O*NET task matches
Batch:
Digital Forensics Analysts
66% ok

Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 3.7/5
45% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 approved at 200
Information Security Engineers 3.7/5
42% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 100
Digital Forensics Analysts
40% ok

Analyze log files or other digital information to identify the perpetrators of network intrusions.

Claude Opus 4.6 denied
Penetration Testers
39% ok

Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.

Claude Opus 4.6 denied
Penetration Testers
39% ok

Design security solutions to address known device vulnerabilities.

Claude Opus 4.6 denied
Information Security Analysts 4.2/5
38% ok

Monitor current reports of computer viruses to determine when to update virus protection systems.

Claude Opus 4.6 denied
Digital Forensics Analysts
38% ok

Perform forensic investigations of operating or file systems.

Claude Opus 4.6 denied
Penetration Testers
37% ok

Develop infiltration tests that exploit device vulnerabilities.

Claude Opus 4.6 denied
Penetration Testers
37% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
LO3

Identify and bypass anti-analysis techniques including obfuscation and packing

10 O*NET task matches
Batch:
Biostatisticians 4.2/5
44% ok

Develop or implement data analysis algorithms.

Claude Opus 4.6 denied
Penetration Testers
38% ok

Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.

Claude Opus 4.6 denied
Data Scientists
37% ok

Write new functions or applications in programming languages to conduct analyses.

Claude Opus 4.6 denied
Biostatisticians 4.4/5
37% ok

Write detailed analysis plans and descriptions of analyses and findings for research protocols or reports.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
37% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 3.7/5
36% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 denied
Computer and Information Resea 3.6/5
35% ok

Conduct logical analyses of business, scientific, engineering, and other technical problems, formulating mathematical models of problems for solution by computers.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
34% ok

Direct the analysis, development, and operation of complete computer systems.

Claude Opus 4.6 denied
Statisticians 4.5/5
34% ok

Prepare data for processing by organizing information, checking for inaccuracies, and adjusting and weighting the raw data.

Claude Opus 4.6 denied
Digital Forensics Analysts
34% ok

Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.

Claude Opus 4.6 denied
LO4

Discover vulnerabilities in software through reverse engineering and analysis

10 O*NET task matches
Batch:
Digital Forensics Analysts
69% ok

Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.

Claude Opus 4.6 approved at 400
Computer Systems Engineers/Arc 3.7/5
66% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 approved at 400
Information Security Engineers 4.3/5
66% ok

Scan networks, using vulnerability assessment tools to identify vulnerabilities.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
62% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 400
Information Security Engineers 3.8/5
61% ok

Coordinate vulnerability assessments or analysis of information security systems.

Claude Opus 4.6 denied
Information Security Engineers 4.6/5
60% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 denied
Penetration Testers
60% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 denied
Penetration Testers
59% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
Database Administrators 3.4/5
57% ok

Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.

Claude Opus 4.6 denied
Penetration Testers
56% ok

Develop infiltration tests that exploit device vulnerabilities.

Claude Opus 4.6 approved at 300
LO5

Analyze compiled code to understand program behavior and logic

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)