Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Reverse Engineering Ransomware

person icon Cristina Gheorghisan

4.5

Reverse Engineering Ransomware

Static and dynamic analysis. Reverse engineering. Writing Decryptors

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Cristina Gheorghisan

English [CC]

category icon IT & Software,Network & Security,Ransomware

Lectures -10

Resources -8

Duration -54 mins

4.5

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

The aim of this course is to provide a practical approach to analyzing ransomware. Working with real world samples of increasing difficulty, we will:

Deep dive into identifying the encryption techniques,

Navigate through various evasion tricks used by malware writers,

Have fun discovering flaws in their logic or the implementation and

Work out automated ways to recover the affected files.

If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualisation and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms,  please check out our Advanced Reverse Engineering Ransomware course! 

Who this course is for:

  • Security testers
  • Malware analysts
  • Forensics investigators
  • System administrators
  • Information security students
  • Anyone interested in ransomware and malware analysis

Goals

What will you learn in this course:

  • The lectures, videos and other resources will provide relevant information about current malware analysis tricks
  • How to use disassemblers and other security tools
  • How to identify flaws in ransomware code or encryption logic
  • Practice on progressively difficult samples which illustrate different concepts each
  • Practice acquired knowledge via quizzes for each section
  • How to write simple decrpytors in a high-level language (source code provided)

Prerequisites

What are the prerequisites for this course?

  • Basic programming knowledge
  • A computer that can run a Windows virtual machine.
  • An interest in disassembling things and understanding how they work!
  • Patience and perseverance to “try harder”.
Reverse Engineering Ransomware

Curriculum

Check out the detailed breakdown of what’s inside the course

Course Introduction
1 Lectures
  • play icon Course Introduction 05:49 05:49
Under the hood of a simple cryptor
5 Lectures
Tutorialspoint
More disassembling and writing decryptors
3 Lectures
Tutorialspoint

Instructor Details

Cristina Gheorghisan

Cristina Gheorghisan

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515