Tutorialspoint

Celebrating 11 Years of Learning Excellence! Use: TP11

Reverse Engineering Ransomware Course

person icon Cristina Gheorghisan

4.7

Reverse Engineering Ransomware Course

Static and dynamic analysis. Reverse engineering. Writing Decryptors

updated on icon Updated on Jun, 2025

language icon Language - English

person icon Cristina Gheorghisan

English [CC]

category icon IT and Software ,Network and Security,Reverse Engineering

Lectures -10

Resources -8

Duration -54 mins

Lifetime Access

4.7

price-loader

Lifetime Access

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

The aim of this course is to provide a practical approach to analyzing ransomware. Working with real-world samples of increasing difficulty, we will:

Deep dive into identifying the encryption techniques,

Navigate through various evasion tricks used by malware writers,

Have fun discovering flaws in their logic or implementation and

Work out automated ways to recover the affected files.

If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualization and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms,  please check out our Advanced Reverse Engineering Ransomware course! 

Who this course is for:

  • Security testers
  • Malware analysts
  • Forensics investigators
  • System administrators
  • Information security students
  • Anyone interested in ransomware and malware analysis

Goals

  • The lectures, videos, and other resources will provide relevant information about current malware analysis tricks
  • How to use disassemblers and other security tools
  • How to identify flaws in ransomware code or encryption logic
  • Practice on progressively difficult samples that illustrate different concepts.
  • Practice acquired knowledge via quizzes for each section
  • How to write simple decryptors in a high-level language (source code provided)

Prerequisites

  • Basic programming knowledge
  • A computer that can run a Windows virtual machine.
  • An interest in disassembling things and understanding how they work!
  • Patience and perseverance to “try harder”.
Reverse Engineering Ransomware Course

Curriculum

Check out the detailed breakdown of what’s inside the course

Course Introduction

1 Lectures
  • play icon Course Introduction 05:49 05:49

Under the hood of a simple cryptor

5 Lectures
Tutorialspoint

More disassembling and writing decryptors

3 Lectures
Tutorialspoint

Instructor Details

Cristina Gheorghisan

Cristina Gheorghisan

Hello and welcome everyone. My name is Cristina. I am a trainer and coach with a strong background in Software Security. For the past 10 years I’ve been working in software industry where security is a topic on a daily basis. I am very happy that you decided to join my courses! Thank you

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515