How difficult is it to acquire good knowledge in Reverse Engineering. Is it always necessary to do reverse engineering when analysing malware? This may sound like a stupid question but since I am a rookie I prefer to post the question. :-) Is there a good document explaining how reverse engineering is done and how to find the important parts in code?
Thanks a lot for your help.