Reverse Engineering Ransomware

person icon Cristina Gheorghisan

Reverse Engineering Ransomware

Static and dynamic analysis. Reverse engineering. Writing Decryptors

updated on icon Updated on Sep, 2023

language icon Language - English

person icon Cristina Gheorghisan

architecture icon IT & Software,Network & Security,Ransomware


30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 19,000+ top Tutorialspoint courses anytime, anywhere.

Course Description

The aim of this course is to provide a practical approach to analyzing ransomware. Working with real world samples of increasing difficulty, we will:

Deep dive into identifying the encryption techniques,

Navigate through various evasion tricks used by malware writers,

Have fun discovering flaws in their logic or the implementation and

Work out automated ways to recover the affected files.

If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualisation and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms,  please check out our Advanced Reverse Engineering Ransomware course! 

Who this course is for:

  • Security testers
  • Malware analysts
  • Forensics investigators
  • System administrators
  • Information security students
  • Anyone interested in ransomware and malware analysis


What will you learn in this course:

  • The lectures, videos and other resources will provide relevant information about current malware analysis tricks
  • How to use disassemblers and other security tools
  • How to identify flaws in ransomware code or encryption logic
  • Practice on progressively difficult samples which illustrate different concepts each
  • Practice acquired knowledge via quizzes for each section
  • How to write simple decrpytors in a high-level language (source code provided)


What are the prerequisites for this course?

  • Basic programming knowledge
  • A computer that can run a Windows virtual machine.
  • An interest in disassembling things and understanding how they work!
  • Patience and perseverance to “try harder”.
Reverse Engineering Ransomware


Check out the detailed breakdown of what’s inside the course

Course Introduction
1 Lectures
  • play icon Course Introduction 05:49 05:49
Under the hood of a simple cryptor
5 Lectures
More disassembling and writing decryptors
3 Lectures

Instructor Details

Cristina Gheorghisan

Cristina Gheorghisan

Trainer and Coach

Hello and welcome everyone. My name is Cristina. I am a trainer and coach with a strong background in Software Security. For the past 10 years I’ve been working in software industry where security is a topic on a daily basis. I am very happy that you decided to join my courses! Thank you

Course Certificate

User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

sample Tutorialspoint certificate

Our students work
with the Best


Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
People having fun around a laptop

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
People having fun around a laptop

Talk to us