Ringzer0 COUNTERMEASURE SPRING//2026

March 22-31 // Ottawa, Canada // Virtual

Ringzer0 COUNTERMEASURE SPRING//2026

Ringzer0 COUNTERMEASURE SPRING//2026 features a blend of virtual and in-person training, held in Ottawa, Canada and virtually.

Virtual Training (March 22-31)

Fuzzing the Linux Kernel
This training guides security researchers and software engineers through the field of Linux kernel fuzzing. In a series of lectures and practical labs, the training explores using fuzzing for finding kernel memory corruption bugs and analyzing their security impact.

INSTRUCTOR: Andrey Konovalov // 32 Hours // March 22-28

Machine Learning for Reverse Engineers
In this course, students will gain the necessary hands-on experience, knowledge, and confidence to conduct automated program analysis at scale using machine learning.

INSTRUCTOR: Hahna Latonick // 32 Hours // March 27-30

The FLARE Guide to Windows Internals and Advanced Reversing
Developed by the FLARE team at Google Cloud Security, this immersive six-day virtual training provides a comprehensive deep dive into the complex world of modern Windows malware.

INSTRUCTORS: Josh Stroschein, Jae Young Kim // 32 Hours // March 22-31

Building Agentic RE: Automating Reverse Engineering & Vulnerability Research with AI
Join this 32-hour course to master reverse engineering in the Agentic Era. Build private AI stacks, develop custom MCP servers, and orchestrate workflows with LLMs as autonomous collaborators. Gain skills to design agentic workflows for analysing binaries and validating results.

INSTRUCTOR: John McIntosh // 32 Hours // March 27-31

Everyday Ghidra: Windows Reverse Engineering and Vulnerability Research
This course teaches Ghidra usage, covering fundamental to advanced techniques with hands-on exercises on real-world Windows applications. It is designed for those with foundational Windows and security knowledge.

INSTRUCTOR: John McIntosh // 32 Hours // March 22-26

Deconstructing Rust Binaries
Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical upskill in your ability to analyze Rust binaries.

INSTRUCTOR: Cindy Xiao // 16 Hours // March 23-27

Vulnerability Research and Exploitation on Edge Devices: Memory Corruption Edition
Participants will research and exploit vulnerabilities on a real-world embedded edge device in Fortune 500 environments, advancing from restrictive shells to fuzzing, crash triage, root-cause analysis, and weaponizing memory-corruption bugs for remote code execution.

INSTRUCTOR: Marco Ortisi // 32 Hours // March 22-31

Mobile Reverse Engineering with r2frida
Learn how to analyze Android and iOS mobile apps with R2Frida. Bypass jailbreak protections, SSL pinning, anti-debugging and even Frida detections using Frida itself.

INSTRUCTORS: Grant Douglas, Eduardo Novella, Alex Soler // 32 Hours // March 22-31

Fuzzing and Attacking Custom Embedded Systems
This training covers analyzing, fuzz testing, and exploiting devices with custom embedded OS. It dives into Arm Firmware, teaches reverse engineering with Ghidra, and offers hands-on exercises to build proficiency with tools like Unicorn, AFL++, and Fuzzware.

INSTRUCTORS Tobias Scharnowski, Marius Muench // 32 Hours // March 22-31

Black Hat Python For Hackers and Pentesters
This course is a companion to Black Hat Python, 2nd Edition, covering major subject areas through hands-on labs and exercises. It is beneficial for both seasoned and new Python programmers.

INSTRUCTOR: Karim Nathoo // 16 Hours // March 22-31

Tickets

Pricing
Model
16h
Training
Virtual
32h
Training
Virtual
Early Bird
(Till Jan 15)
USD 2100 USD 4000
Standard
(Jan 1 - Mar 7)
USD 2300 USD 4200
Late
(Mar 8 - Mar 21)
USD 2500 USD 4400
Ringzer0’s Virtual Training Experience & FAQ
What can I expect from a virtual training delivered by Ringzer0, and answers to frequently asked questions.
SPRING 2026 // Virtual Training // March 22-31
Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated