{"id":69553,"date":"2024-12-17T15:11:36","date_gmt":"2024-12-17T14:11:36","guid":{"rendered":"https:\/\/www.esiea.fr\/?page_id=69553"},"modified":"2026-02-24T11:40:01","modified_gmt":"2026-02-24T10:40:01","slug":"badge-reverse-engineering","status":"publish","type":"page","link":"https:\/\/www.esiea.fr\/formations-specialisees\/badge-reverse-engineering\/","title":{"rendered":"BADGE Reverse Engineering"},"content":{"rendered":"\n<section class=\"block-hero-formation\">\n    <div class=\"wrapper-img\" style=\"--opacity:0.4\">\n        <picture class=\"cover\">\n            <source\n            type=\"image\/webp\"\n            srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-32.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-32@2x.webp 2x\"\n            >\n            <source\n            type=\"image\/jpeg\"\n            srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-32.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-32@2x.jpg 2x\"\n            >\n            <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-32.jpg\" width=\"1000\" height=\"667\" alt=\"\u00c9tudiants ESIEA cybers\u00e9curit\u00e9\" \/>\n        <\/picture>\n    <\/div>\n    <div class=\"container container-row \">\n        <div class=\"wrapper-txt \">\n\t\t\t                            <h1>BADGE Reverse Engineering<\/h1>\n                                        <div class=\"txt\"><div class=\"txt\">\n<p>5 mois pour devenir un expert en r\u00e9tro-ing\u00e9nierie<\/p>\n<\/div>\n<\/div>\n                                        <div class=\"wrapper-btns\">\n                                                                        <a href=\"https:\/\/www.calameo.com\/read\/004329616bfa028809aca\" target=\"_blank\" rel=\"noopener\" class=\"btn btn-primary\">\n                                <span>La brochure <\/span>\n                            <\/a>\n                                                                                                <a href=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/11\/calendrier-BADGE-2026-v2.pdf\" target=\"_blank\" rel=\"noopener\" class=\"btn btn-secondary\">\n                                <span>Agenda BADGE 2026<\/span>\n                            <\/a>\n                                                            <\/div>\n            \t\t<\/div>\n                     <div class=\"wrapper-infos\">\n                                    <p class=\"lg\">Informations cl\u00e9s<\/p>\n                                                    <div class=\"criterias\">\n                                                    <div>\n                                <p class=\"title\">Certification<\/p>\n                                <p>Formation accr\u00e9dit\u00e9e par la Conf\u00e9rence des Grandes \u00c9coles (CGE)<\/p>\n                            <\/div>\n                                            <\/div>\n                                                    <div class=\"infos\">\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-home.png)\">Campus<\/p>\n                                <p class=\"text\">Paris intra-muros (5e arr)<\/p>\n                            <\/div>\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-006-info.png)\">Niveau requis<\/p>\n                                <p class=\"text\">Solides bases en informatique n\u00e9cessaires<\/p>\n                            <\/div>\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-002-clock.png)\">Dur\u00e9e<\/p>\n                                <p class=\"text\">5 mois<\/p>\n                            <\/div>\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-005-briefcase.png)\">Rythme<\/p>\n                                <p class=\"text\">Principalement soirs et week-ends, compatible avec une activit\u00e9 professionnelle<\/p>\n                            <\/div>\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-calendar-2.png)\">Rentr\u00e9e<\/p>\n                                <p class=\"text\">Janvier <BR\/> (1 session par an)<\/p>\n                            <\/div>\n                                                    <div>\n                                <p class=\"title title-img\" style=\"--picto:url(https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/picto-006-info.png)\">Tarif<\/p>\n                                <p class=\"text\">6500\u20ac financement personnel \/ 8900\u20ac financement autre<\/p>\n                            <\/div>\n                                            <\/div>\n                                            <\/div>\n        \t<\/div>\n<\/section>\n\n<section class=\"block-anchors\">\n    <div class=\"container\">\n                    <button aria-label=\"Clic ancre vers la section Pr\u00e9sentation\" role=\"button\" data-id=\"presentation\">Pr\u00e9sentation<\/button>\n                    <button aria-label=\"Clic ancre vers la section Objectifs\" role=\"button\" data-id=\"Objectifs\">Objectifs<\/button>\n                    <button aria-label=\"Clic ancre vers la section Modules\" role=\"button\" data-id=\"Modules\">Modules<\/button>\n                    <button aria-label=\"Clic ancre vers la section Candidature\" role=\"button\" data-id=\"Candidature\">Candidature<\/button>\n            <\/div>\n<\/section>\n\n\n<section class=\"block-cta  pt-sm pb-sm pt-m-0 pb-m-sm\"  >\n    <div class=\"container \">\n        <div class=\"wrapper-txt \">\n\t\t\t                <span class=\"label\">Recrutement en cours !<\/span>\n                                        <p class=\"title\">Candidatures pour le BADGE reverse engineering ouvertes !<\/p>\n                                        <div class=\"txt\"><p data-start=\"273\" data-end=\"498\">Ne manquez pas cette session, <strong data-start=\"401\" data-end=\"420\">places limit\u00e9es,<\/strong> envoyez votre dossier d\u00e8s aujourd\u2019hui par mail \u00e0<br \/>\n<a href=\"mailto:badge-re@esiea.fr\">badge-re@esiea.fr<\/a> et intitul\u00e9 \u00ab Candidature BADGE-RE \u00bb..<\/p>\n<\/div>\n                                        <div class=\"wrapper-btns\">\n                                                                        <a href=\"https:\/\/www.calameo.com\/read\/004329616f7507b09bc21\" target=\"_blank\" rel=\"noopener\" class=\"btn btn-primary\">\n                                <span>T\u00e9l\u00e9charger le dossier de candidature BADGE<\/span>\n                            <\/a>\n                                                            <\/div>\n            \t\t<\/div>\n                            \t<\/div>\n<\/section>\n\n\n\n<section class=\"block-texte-image white pt-lg pb-lg pt-m-sm pb-m-sm\" id=\"presentation\" > \n    <div class=\"container left\">\n        <div class=\"wrapper-txt  img\">\n                            <span class=\"label\">Pr\u00e9sentation<\/span>\n                                        <h2>Pr\u00e9sentation de la formation<\/h2>\n                                        <div class=\"txt\">\n                    <div class=\"txt\">\n<p>Le BADGE Reverse Engineering est une formation op\u00e9rationnelle 100% pr\u00e9sentiel et 100% centr\u00e9e sur la retro-ing\u00e9nierie.<\/p>\n<p>Les formations BADGE de l\u2019ESIEA, c\u2019est chacune 230 h de th\u00e9orie et pratique en face \u00e0 face assur\u00e9es exclusivement par des experts reconnus, qui sont tous en poste dans les entreprises et entit\u00e9s publiques les plus avanc\u00e9es en\u00a0 cybers\u00e9curit\u00e9.<\/p>\n<p>Chaque formation BADGE est port\u00e9e avec une entreprise pure player de la la cybers\u00e9curit\u00e9 avec qui nous partageons le m\u00eame objectif d\u2019excellence op\u00e9rationnelle. C\u2019est l\u2019assurance qu\u2019\u00e0 la fin de la formation chaque apprenant soit form\u00e9 \u00e0 l\u2019\u00e9tat de l\u2019art technologique et m\u00e9thodologique du domaine. L\u2019ESIEA contribue ainsi \u00e0 former des sp\u00e9cialistes dont l\u2019expertise op\u00e9rationnelle est reconnue et recherch\u00e9e<\/p>\n<\/div>\n\n                <\/div>\n                                         <div class=\"wrapper-btns\">\n                                                                        <a href=\"https:\/\/www.calameo.com\/read\/004329616bfa028809aca\"  class=\"btn btn-primary\">\n                                <span>La brochure<\/span>\n                            <\/a>\n                                                                                                <a href=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/11\/calendrier-BADGE-2026-v2.pdf\" target=\"_blank\" rel=\"noopener\" class=\"btn btn-secondary\">\n                                <span>Calendrier BADGE 2026<\/span>\n                            <\/a>\n                                                            <\/div>\n                    <\/div>\n                    <div class=\"wrapper-media size-50\">\n                                    <picture class=\"cover\">\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-52-667x700.jpg\" width=\"667\" height=\"1000\" alt=\"\u00c9tudiant ESIEA Ivry Cybers\u00e9curit\u00e9\" loading=\"lazy\" \/>\n                    <\/picture>\n                            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"block-accordeon-image white pt-lg pb-lg pt-m-sm pb-m-sm\"  >\n    <div class=\"container\">\n\t\t<div class=\"wrapper-txt\">\n\t\t\t                <span class=\"label\">Objectifs<\/span>\n                                        <h2>Pr\u00e9requis et objectifs de la formation<\/h2>\n            \t\t<\/div>\n    <\/div>\n    <div class=\"container\">\n        <div class=\"wrapper-images\">\n                                                <picture class=\"cover media active\">\n                        <source\n                        type=\"image\/webp\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-1400x1080@2x.webp 2x\"\n                        >\n                        <source\n                        type=\"image\/jpeg\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-1400x1080@2x.jpg 2x\"\n                        >\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.png\" width=\"1920\" height=\"1080\" alt=\"\" \/>\n                    <\/picture>\n                                                                <picture class=\"cover media \">\n                        <source\n                        type=\"image\/webp\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-1400x1080@2x.webp 2x\"\n                        >\n                        <source\n                        type=\"image\/jpeg\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-1400x1080@2x.jpg 2x\"\n                        >\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.png\" width=\"1920\" height=\"1080\" alt=\"Data analyst\" \/>\n                    <\/picture>\n                                    <\/div>\n                    <div class=\"wrapper-accordions\" role=\"tablist\" aria-label=\"FAQ List\">\n                                    <div  class=\"accordion active\">\n                        <div class=\"accordion-title\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-accordion-1\" aria-expanded=\"false\">\n                                                        <p class=\"lg bold\">Pr\u00e9requis pour candidater \u00e0 la formation<\/p>\n                        <\/div>\n                        <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-accordion-1\" aria-hidden=\"true\">\n                            <div class=\"contain-txt\">\n                                <div class=\"txt sm\">\n                                    <p>La connaissance du fonctionnement d\u2019un syst\u00e8me d\u2019exploitation (Windows \/ Linux) est une base utile \u2013 en particulier la gestion de la m\u00e9moire et des processus.<\/p>\n<p>Il faut \u00e9galement conna\u00eetre au moins l\u2019un des outils suivants par cat\u00e9gorie :<\/p>\n<ul>\n<li>Notions pour un assembleur (x86, ARM, MIPS, PPC, \u2026)<\/li>\n<li>Langages : C\/C++, python, ruby<\/li>\n<li>D\u00e9sassembleurs : IDA, metasm<\/li>\n<li>Debuggers : ollydbg, windbg, gdb<\/li>\n<\/ul>\n\n                                <\/div>\n                                                                                                    <picture class=\"cover active\">\n                                        <source\n                                        type=\"image\/webp\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-1400x1080@2x.webp 2x\"\n                                        >\n                                        <source\n                                        type=\"image\/jpeg\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-1400x1080@2x.jpg 2x\"\n                                        >\n                                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/Consultant-Cybersecurite-700x700.png\" width=\"1920\" height=\"1080\" alt=\"\" \/>\n                                    <\/picture>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div  class=\"accordion \">\n                        <div class=\"accordion-title\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-accordion-2\" aria-expanded=\"false\">\n                                                        <p class=\"lg bold\">Objectifs de la formation<\/p>\n                        <\/div>\n                        <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-accordion-2\" aria-hidden=\"true\">\n                            <div class=\"contain-txt\">\n                                <div class=\"txt sm\">\n                                    <p>Le BADGE reverse engineering reviendra sur les notions \u00e9l\u00e9mentaires li\u00e9es aux architectures \u00e9tudi\u00e9es pendant la formation (x86, x86_64 et ARM principalement). Les \u00e9tudiants se pencheront sur les principales applications du reverse engineering : malwares, protections, programmes de grosse taille, protocoles non document\u00e9s et cryptographie.<\/p>\n<p>\u00c0 l\u2019issue de cette formation, les participants seront capables de r\u00e9pondre \u00e0 tous les besoins en terme de reverse engineering et auront \u00e9t\u00e9 confront\u00e9s \u00e0 de nombreux cas pratiques. Ils seront alors capables de comprendre le comportement de tout programme, prot\u00e9g\u00e9 ou non, et de l\u2019\u00e9tudier de mani\u00e8re approfondie.<\/p>\n\n                                <\/div>\n                                                                                                    <picture class=\"cover \">\n                                        <source\n                                        type=\"image\/webp\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-1400x1080@2x.webp 2x\"\n                                        >\n                                        <source\n                                        type=\"image\/jpeg\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-1400x1080@2x.jpg 2x\"\n                                        >\n                                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/01\/data-scientist-700x700.png\" width=\"1920\" height=\"1080\" alt=\"Data analyst\" \/>\n                                    <\/picture>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n\t\t\t<\/div>\n<\/section>\n\n\n<section class=\"block-accordion white pt-lg pb-lg pt-m-sm pb-m-sm\"  >\n    <div class=\"container\">\n        <div class=\"wrapper-txt\">\n                            <span class=\"label\">Th\u00e9matiques enseign\u00e9es<\/span>\n                                        <h2>Modules du BADGE Reverse Engineering<\/h2>\n                                        <div class=\"txt\">\n                    <p>Cette formation BADGE en \u00ab reverse engineering \u00bb (tout comme celle en <a href=\"https:\/\/www.esiea.fr\/formations-specialisees\/badge-securite-offensive\/\">\u00ab s\u00e9curit\u00e9 offensive \u00bb<\/a>) a \u00e9t\u00e9 con\u00e7ue conjointement par\u00a0<a href=\"https:\/\/www.esiea.fr\/\">l\u2019ESIEA<\/a>\u00a0et\u00a0<a href=\"https:\/\/www.quarkslab.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">QUARKSLAB<\/a>\u00a0en collaboration avec des personnalit\u00e9s aux comp\u00e9tences reconnues issues de diff\u00e9rents milieux (entreprises de service, industrie, \u00c9tat). L\u2019objectif de ce BADGE \u00e9tant de faire de vous l\u2019expert en s\u00e9curit\u00e9 de l\u2019information que les entreprises, mais aussi les organismes publics recherchent activement, il vous pr\u00e9parera aux multiples environnements dans lesquels vous serez amen\u00e9s \u00e0 \u00e9voluer.<\/p>\n\n                <\/div>\n                    <\/div>\n        <div class=\"wrapper-tabs\">\n            <div class=\"contain-tabs\">\n                <div class=\"splide splide-0\"  aria-label=\"Slider cards\">\n                    <div class=\"splide__track\">\n                        <div class=\"splide__list\">\n                                                            <h3 class=\"tab active splide__slide\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-card-1\" aria-selected=\"true\">\n                                    Modules\n                                <\/h3>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n                    <div class=\"wrapper-cards\">\n                                    <div class=\"block active\" aria-controls=\"tab-card-accordion-1\" role=\"tabpanel\" id=\"tab-card-1\">\n                                                    <div class=\"accordion active\">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">ASM \/ ARM<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-1\">\n                                                                            <div class=\"txt lg\">\n                                            <p><strong>Introduction \u00e0 l\u2019ASM x86 et \u00e0 l\u2019ARM<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td>Ce module est une brique de base sur lequel les intervenants de la formation s\u2019appuieront. Il s\u2019agit de voir ou revoir les concepts li\u00e9s au reverse engineering ainsi que les particularit\u00e9s de l\u2019ASM et de l\u2019ARM. Au travers des diff\u00e9rents exercices pratiques, les \u00e9tudiants vont acqu\u00e9rir un bagage technique suffisant pour aborder les diff\u00e9rents sujets de la formation.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Cryptographie<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-2\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Ce cours a pour objectif d\u2019introduire les concepts fondamentaux de la cryptographie moderne ainsi que de donner un aper\u00e7u des primitives pr\u00e9sentes dans les protocoles cryptographiques actuels. \u00c0 l\u2019issue de la formation, les \u00e9tudiants auront les connaissances et la m\u00e9thodologie n\u00e9cessaires \u00e0 l\u2019identification et au reverse engineering d\u2019algorithmes cryptographiques.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Exploitation de binaires Orient\u00e9s Objet<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-3\">\n                                                                            <div class=\"txt lg\">\n                                            <p>L\u2019analyse de binaires d\u00e9velopp\u00e9s dans un langage orient\u00e9 objet n\u00e9cessite des notions sp\u00e9cifiques \u00e0 ce dernier. Cette intervention a pour but, par le biais de l\u2019\u00e9tude des caract\u00e9ristiques li\u00e9es au C++, d\u2019introduire les concepts et la fa\u00e7on d\u2019analyser ce type d\u2019ex\u00e9cutable.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Compilation et obfuscation<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-4\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Ce cours permet de se familiariser avec les diff\u00e9rentes \u00e9tapes du processus de compilation d\u2019un programme et propose un aper\u00e7u des techniques d\u2019obfuscation basiques. Ces notions sont utiles afin de comprendre les optimisations effectu\u00e9es par le compilateur ainsi que d\u2019identifier certains m\u00e9canismes utilis\u00e9s pour contrer l\u2019analyse de binaire.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Reverse mobile<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-5\">\n                                                                            <div class=\"txt lg\">\n                                            <p>L\u2019objectif de ce module est de pr\u00e9senter les notions de base associ\u00e9es au reverse engineering sur mobile. \u00c0 l\u2019issue de la formation, les \u00e9tudiants seront capables d\u2019analyser et de d\u00e9bugger des applications IOS et Android et auront une connaissance g\u00e9n\u00e9rale des m\u00e9caniques internes \u00e0 ces deux plateformes.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Outils et frameworks d\u2019analyse<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-6\">\n                                                                            <div class=\"txt lg\">\n                                            <table>\n<tbody>\n<tr>\n<td>Le reverse engineering d\u2019applications r\u00e9elles peut \u00eatre long et fastidieux. Il est parfois n\u00e9cessaire de d\u00e9velopper ses propres scripts afin de faciliter leur analyse. Ce module pr\u00e9sente diff\u00e9rents outils tels que Metasm, Miasm et Triton qui aident au reverse en proposant chacun un angle d\u2019approche diff\u00e9rent. \u00c0 la fin de la formation, les \u00e9tudiants auront une id\u00e9e de l\u2019utilit\u00e9 de tels outils, et seront en capacit\u00e9 de les utiliser efficacement.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Format de fichier ex\u00e9cutable<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-7\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Ce cours apporte des connaissances sur les structures internes d\u2019un fichier ex\u00e9cutable ainsi que sur le processus de chargement de binaires sur le syst\u00e8me d\u2019exploitation.<br \/>\n\u00c0 l\u2019issue de cette intervention, les \u00e9tudiants seront capables d\u2019\u00e9tudier et de manipuler ce type de format ainsi que de reconnaitre les diff\u00e9rentes structures le constituant.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Reverse Engineering mat\u00e9riel<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-8\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Le reverse engineering ne s\u2019arr\u00eate pas \u00e0 la couche logicielle. De plus en plus d\u2019attaques sont possibles au niveau mat\u00e9riel. Ce module a pour objectif de montrer, par la pratique, une m\u00e9thodologie d\u2019analyse de devices embarqu\u00e9s et de fournir les connaissances de base en reverse engineering mat\u00e9riel.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Architectures d\u2019un syst\u00e8me d\u2019exploitation<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-9\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Ce cours pr\u00e9sente l\u2019architecture des ordinateurs, les couches physiques, le noyau, l\u2019espace utilisateur, et les liens entre les composants logiciels et le mat\u00e9riel. Il s\u2019agit de comprendre le fonctionnement interne d\u2019un ordinateur et des m\u00e9canismes qui permettent ensuite d\u2019interagir avec un programme (pagination, segmentation, DMA, breakpoints logiciels et mat\u00e9riels, gestion des fautes, etc.).<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Exploitation de vuln\u00e9rabilit\u00e9s<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-10\">\n                                                                            <div class=\"txt lg\">\n                                            <p>Cette intervention a pour vocation de pr\u00e9senter les diff\u00e9rentes classes de vuln\u00e9rabilit\u00e9 ainsi qu\u2019une m\u00e9thodologie li\u00e9e \u00e0 la recherche de ces derni\u00e8res. Dans ce module, les \u00e9tudiants sont invit\u00e9s \u00e0 analyser des failles logicielles et d\u00e9velopper des codes d\u2019exploitation fonctionnels.<\/p>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <div class=\"accordion \">\n                                <div class=\"accordion-title\" role=\"tab\"  aria-expanded=\"false\" tabindex=\"0\">\n                                    <p class=\"lg bold\">Analyse de malwares<\/p>\n                                <\/div>\n                                <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-card-accordion-11\">\n                                                                            <div class=\"txt lg\">\n                                            <table>\n<tbody>\n<tr>\n<td>Les malwares sont des binaires particuliers qui peuvent s\u2019av\u00e9rer compliqu\u00e9s \u00e0 reverser : ils sont g\u00e9n\u00e9ralement accompagn\u00e9s par de nombreux m\u00e9canismes de protection et leur nature m\u00eame peut rendre p\u00e9nible leur analyse. Ce cours a pour objectif d\u2019apprendre \u00e0 \u00e9tudier efficacement ces programmes. Vu le nombre sans cesse croissant de tels codes, il est impossible de tout regarder manuellement. Nous passerons donc en revue les outils et les m\u00e9thodes de classification afin d\u2019optimiser les analyses.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n                                        <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n                            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"block-logos-slider ok white pt-lg pb-lg pt-m-sm pb-m-sm\"  >\n        <div class=\"container container-txt\">\n        <div class=\"wrapper-txt\">\n                            <p class=\"label\">nos labels<\/p>\n                                        <h2>Des labels renomm\u00e9s<\/h2>\n                    <\/div>\n    <\/div>\n        <div class=\"container-logos \" data-splide='{\"type\":\"loop\", \"gap\":48, \"pagination\": false, \"arrows\": false, \"fixedWidth\": 138,  \"autoScroll\":{\"speed\":1, \"pauseOnHover\":true }}'>\n        <div class=\"splide__track\">\n            <div class=\"splide__list\">\n                                    <picture class=\"splide__slide\">\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/cge_rvb-web_0.png.webp\" width=\"790\" height=\"290\" alt=\"Conf\u00e9rence des grandes \u00e9coles esiea\" loading=\"lazy\" \/>\n                    <\/picture>\n                                    <picture class=\"splide__slide\">\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/07\/badge_rectangle_cge.png\" width=\"874\" height=\"248\" alt=\"BADGE conf\u00e9rence grandes \u00e9coles\" loading=\"lazy\" \/>\n                    <\/picture>\n                                    <picture class=\"splide__slide\">\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2025\/11\/Qualiopi-large-scaled.png\" width=\"2560\" height=\"466\" alt=\"\" loading=\"lazy\" \/>\n                    <\/picture>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"block-accordeon-image light pt-lg pb-lg pt-m-sm pb-m-sm\"  >\n    <div class=\"container\">\n\t\t<div class=\"wrapper-txt\">\n\t\t\t                <span class=\"label\">Points forts<\/span>\n                                        <h2>Points forts de la formation<\/h2>\n            \t\t<\/div>\n    <\/div>\n    <div class=\"container\">\n        <div class=\"wrapper-images\">\n                                                <picture class=\"cover media active\">\n                        <source\n                        type=\"image\/webp\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6@2x.webp 2x\"\n                        >\n                        <source\n                        type=\"image\/jpeg\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6@2x.jpg 2x\"\n                        >\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.jpg\" width=\"1000\" height=\"667\" alt=\"\u00c9tudiants ESIEA IVRY\" \/>\n                    <\/picture>\n                                                                <picture class=\"cover media \">\n                        <source\n                        type=\"image\/webp\"\n                        srcset=\",  2x\"\n                        >\n                        <source\n                        type=\"image\/jpeg\"\n                        srcset=\",  2x\"\n                        >\n                        <img decoding=\"async\" src=\"\" width=\"\" height=\"\" alt=\"\" \/>\n                    <\/picture>\n                                                                <picture class=\"cover media \">\n                        <source\n                        type=\"image\/webp\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163@2x.webp 2x\"\n                        >\n                        <source\n                        type=\"image\/jpeg\"\n                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163@2x.jpg 2x\"\n                        >\n                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.jpg\" width=\"1000\" height=\"667\" alt=\"Etudiant ESIEA Administrateur Syst\u00e8mes\" \/>\n                    <\/picture>\n                                    <\/div>\n                    <div class=\"wrapper-accordions\" role=\"tablist\" aria-label=\"FAQ List\">\n                                    <div  class=\"accordion active\">\n                        <div class=\"accordion-title\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-accordion-1\" aria-expanded=\"false\">\n                                                        <picture>\n                                <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-009-mallette.png\" width=\"1000\" height=\"1000\" alt=\"entreprises-esiea\" \/>\n                            <\/picture>\n                                                        <p class=\"lg bold\">Formation continue<\/p>\n                        <\/div>\n                        <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-accordion-1\" aria-hidden=\"true\">\n                            <div class=\"contain-txt\">\n                                <div class=\"txt sm\">\n                                    <ul>\n<li>Formation compatible avec une activit\u00e9 professionnelle en parall\u00e8le : les s\u00e9ances se d\u00e9roulent principalement en soir\u00e9es et week-ends<\/li>\n<\/ul>\n\n                                <\/div>\n                                                                                                    <picture class=\"cover active\">\n                                        <source\n                                        type=\"image\/webp\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6@2x.webp 2x\"\n                                        >\n                                        <source\n                                        type=\"image\/jpeg\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6@2x.jpg 2x\"\n                                        >\n                                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_24-25-6-700x667.jpg\" width=\"1000\" height=\"667\" alt=\"\u00c9tudiants ESIEA IVRY\" \/>\n                                    <\/picture>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div  class=\"accordion \">\n                        <div class=\"accordion-title\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-accordion-2\" aria-expanded=\"false\">\n                                                        <picture>\n                                <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-018-certificat.png\" width=\"1000\" height=\"1000\" alt=\"Formation certifi\u00e9e\" \/>\n                            <\/picture>\n                                                        <p class=\"lg bold\">Une formation reconnue et certifi\u00e9e<\/p>\n                        <\/div>\n                        <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-accordion-2\" aria-hidden=\"true\">\n                            <div class=\"contain-txt\">\n                                <div class=\"txt sm\">\n                                    <ul>\n<li>Formation accr\u00e9dit\u00e9e par la\u00a0<a href=\"https:\/\/www.cge.asso.fr\/nos-labels\/badge\" target=\"_blank\" rel=\"noreferrer noopener\">Conf\u00e9rence des Grandes \u00c9coles<\/a> (CGE)<\/li>\n<\/ul>\n\n                                <\/div>\n                                                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div  class=\"accordion \">\n                        <div class=\"accordion-title\" tabindex=\"0\" role=\"tab\" aria-controls=\"tab-accordion-3\" aria-expanded=\"false\">\n                                                        <picture>\n                                <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-086-chiffrement.png\" width=\"1000\" height=\"1000\" alt=\"Chiffrement Cybers\u00e9curit\u00e9\" \/>\n                            <\/picture>\n                                                        <p class=\"lg bold\">Encadrement en pr\u00e9sentiel<\/p>\n                        <\/div>\n                        <div class=\"accordion-content\" role=\"tabpanel\" id=\"tab-accordion-3\" aria-hidden=\"true\">\n                            <div class=\"contain-txt\">\n                                <div class=\"txt sm\">\n                                    <p>230h de s\u00e9ances pr\u00e9sentielles encadr\u00e9es par diff\u00e9rents responsables p\u00e9dagogiques travaillant ou ayant travaill\u00e9s dans des entreprises sp\u00e9cialis\u00e9es dans la cybers\u00e9curit\u00e9 :<\/p>\n<p>L\u2019encadrement est assur\u00e9 par\u00a0:<\/p>\n<ul>\n<li>Pauline Sauder (QUARKSLAB)<\/li>\n<li>Vincent Guyot (<a href=\"https:\/\/www.esiea.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESIEA<\/a>)<\/li>\n<\/ul>\n\n                                <\/div>\n                                                                                                    <picture class=\"cover \">\n                                        <source\n                                        type=\"image\/webp\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163@2x.webp 2x\"\n                                        >\n                                        <source\n                                        type=\"image\/jpeg\"\n                                        srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163@2x.jpg 2x\"\n                                        >\n                                        <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/rentree_ivry_ok24-25-163-700x667.jpg\" width=\"1000\" height=\"667\" alt=\"Etudiant ESIEA Administrateur Syst\u00e8mes\" \/>\n                                    <\/picture>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n\t\t\t<\/div>\n<\/section>\n\n\n<section class=\"block-cards beige pt-lg pb-lg pt-m-sm pb-m-sm\" id=\"Candidature\" >\n    <div class=\"container\">\n        <div class=\"wrapper-txt\">\n                            <span class=\"label\">Candidature<\/span>\n                                        <h2>Comment candidater : <\/h2>\n                                <\/div>\n                    <div class=\"wrapper-cards\">\n                                    <div class=\"block\">\n                                                    <picture class=\"cover\">\n                                <source\n                                type=\"image\/webp\"\n                                srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-116-lettre-de-motivation.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-116-lettre-de-motivation@2x.webp 2x\"\n                                >\n                                <source\n                                type=\"image\/jpeg\"\n                                srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-116-lettre-de-motivation.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-116-lettre-de-motivation@2x.jpg 2x\"\n                                >\n                                <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-116-lettre-de-motivation.png\" width=\"1000\" height=\"1000\" alt=\"Picto dosser de candidature\" \/>\n                            <\/picture>\n                                                                                                    <div class=\"txt\"><p><a href=\"https:\/\/www.calameo.com\/read\/004329616f7507b09bc21\">T\u00e9l\u00e9chargez le dossier de candidature.<\/a><\/p>\n<p>Envoyez-le dans un mail\u00a0 intitul\u00e9 \u00ab Candidature BADGE-RE \u00bb adress\u00e9 \u00e0\u00a0 <a href=\"mailto:badge-re@esiea.fr\">badge-re@esiea.fr<\/a><\/p>\n<\/div>\n                                            <\/div>\n                                    <div class=\"block\">\n                                                    <picture class=\"cover\">\n                                <source\n                                type=\"image\/webp\"\n                                srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-124-accord.webp, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-124-accord@2x.webp 2x\"\n                                >\n                                <source\n                                type=\"image\/jpeg\"\n                                srcset=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-124-accord.jpg, https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-124-accord@2x.jpg 2x\"\n                                >\n                                <img decoding=\"async\" src=\"https:\/\/www.esiea.fr\/wp-content\/uploads\/2024\/12\/Pictos-PNG-124-accord.png\" width=\"1000\" height=\"1000\" alt=\"Humain\" \/>\n                            <\/picture>\n                                                                                                    <div class=\"txt\"><p>Vous serez ensuite contact\u00e9 pour la suite de votre candidature.<\/p>\n<\/div>\n                                            <\/div>\n                            <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"block-cta  pt-lg pb-lg pt-m-sm pb-m-sm\"  >\n    <div class=\"container \">\n        <div class=\"wrapper-txt \">\n\t\t\t                                        <div class=\"txt\"><h2 style=\"text-align: center;\">Vous souhaitez en apprendre plus sur notre formation BADGE reverse engineering ?<\/h2>\n<\/div>\n                                        <div class=\"wrapper-btns\">\n                                                                        <a href=\"https:\/\/www.calameo.com\/read\/004329616bfa028809aca\"  class=\"btn btn-primary\">\n                                <span>La brochure<\/span>\n                            <\/a>\n                                                            <\/div>\n            \t\t<\/div>\n                            \t<\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":2128,"parent":69096,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"%%post_title%% %%sep%% %%sitetitle%%","_seopress_titles_desc":"Formation BADGE Reverse Engineering accr\u00e9dit\u00e9e CGE \u00e0 Paris : devenez expert en r\u00e9tro-ing\u00e9nierie, malware, exploitation et syst\u00e8mes embarqu\u00e9s. Soirs et week-ends, compatible emploi.","_seopress_robots_index":"","content-type":"","footnotes":""},"class_list":["post-69553","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/pages\/69553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/comments?post=69553"}],"version-history":[{"count":38,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/pages\/69553\/revisions"}],"predecessor-version":[{"id":88162,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/pages\/69553\/revisions\/88162"}],"up":[{"embeddable":true,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/pages\/69096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/media\/2128"}],"wp:attachment":[{"href":"https:\/\/www.esiea.fr\/wp-json\/wp\/v2\/media?parent=69553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}