Über diesen Kurs

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Ca. 18 Stunden zum Abschließen

Englisch

Untertitel: Englisch

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Ca. 18 Stunden zum Abschließen

Englisch

Untertitel: Englisch

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
3 Stunden zum Abschließen

Introduction

After reporting on the insights of a real-world research about a botnet takeover, students will learn about malicious software, with a particular glimpse at botnets and their detection to finally conlude brielfy with rootkits.<BR><BR><B>Lecture outline</B><BR>1. Should we care? A botnet takeover storytelling<BR>2. Admin blabbing<BR>3. Malicious software <BR>4. (a glimpse at)Botnets<BR>5. (a glimpse at) Botnets detection & Rootkits

...
12 Videos (Gesamt 115 min), 1 Lektüre, 1 Quiz
12 Videos
Should we care? A botnet takeover storytelling11m
Admin blabbing 11m
Malicious Software (part 1) 10m
Malicious Software (part 2) 9m
(a glimpse at) Botnets (part 1) 10m
(a glimpse at) Botnets (part 2) 6m
(a glimpse at) Botnets (part 3) 10m
(a glimpse at) Botnets detection and Rootkits (part 1)8m
(a glimpse at) Botnets detection and Rootkits (part 2)9m
(a glimpse at) Botnets detection and Rootkits (part 3)11m
(a glimpse at) Botnets detection and Rootkits (part 4)13m
1 Lektüre
Module One Reading10m
1 praktische Übung
Week 1 — Quiz50m
Woche
2
3 Stunden zum Abschließen

Static analysis and its limitations

Students will look at the malware landscape of the early days and what effort and challenges the AV industry was facing to fight malware threats. The lecture covers static analysis as a first technique to analyze and detect malware; (basic) assembly and reverse engineering notions are provided with a look at basic techniques to fool the state-of-the-art disassembly algorithm, quickly highlighting the limits of static analysis, especially when focused on analyzing malware. A walk-through to reverse engineer an example program concludes the lecture.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Early days, AV industry<BR>2. (a glimpse at) Reverse engineering (part 1)<BR>3. (a glimpse at) Reverse engineering (part 2)<BR>4. (a glimpse at) Polymorphism, code obfuscation<BR>5. IDA Pro—a very simple example. . .

...
8 Videos (Gesamt 99 min), 1 Lektüre, 1 Quiz
8 Videos
(a glimpse at) Reverse engineering (part 1.1) 11m
(a glimpse at) Reverse engineering (part 1.2) 11m
(a glimpse at) Reverse engineering (part 1.3) 8m
(a glimpse at) Reverse engineering (part 2) 9m
(a glimpse at) Polymorphism, code obfuscation 18m
IDA Pro—a very simple example. . . (part 1) 10m
IDA Pro—a very simple example. . . (part 2) 13m
1 Lektüre
Module Two Reading10m
1 praktische Übung
Week 2 — Quiz1h 4m
Woche
3
3 Stunden zum Abschließen

Dynamic analysis and its limitations

While looking at how the malware landscape has been evolving, students will be given an introduction at dynamic analysis, a complementary technique to static analysis to fight malware threats. Packing and algorithmic-agnostic unpacking is introduced as an initial step toward full dynamic analysis. The lecture quickly mentions sandboxes and limits of dynamic analysis and sandboxes, to finally conclude with a brief overview of a particular academic research state-of-the-art for malware protection.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Toward dynamic analysis<BR>2. (a glimpse at) Dynamic analysis (part 1)<BR>3. (a glimpse at) Dynamic analysis (part 2)<BR>4. (a glimpse at) Limits of dynamic analysisM<BR>5. AccessMiner—system-centric models

...
7 Videos (Gesamt 87 min), 1 Lektüre, 1 Quiz
7 Videos
(a glimpse at) Dynamic analysis (part 1.1) 11m
(a glimpse at) Dynamic analysis (part 1.2) 14m
(a glimpse at) Dynamic analysis (part 2.1) 10m
(a glimpse at) Dynamic analysis (part 2.2) 9m
(a glimpse at) Limits of dynamic analysis 11m
AccessMiner — system-centric models 15m
1 Lektüre
Module Three Reading10m
1 praktische Übung
Week 3 — Dynamic analysis and its limitations1h 2m
Woche
4
2 Stunden zum Abschließen

Mobile malware

The lecture introduces the students to mobile malware threats; in particular, the lecture focuses on Android malware, providing a quick overview of Android applications and describing a <A href= "http://copperdroid.isg.rhul.ac.uk/">virtual machine-based dynamic analysis research</a> carried out in the <a href= "http://www.isg.rhul.ac.uk/">ISG</a> at <a href= "http://www.rhul.ac.uk/">Royal Holloway University of London</a> in collaboration with the <a href= "http://security.di.unimi.it/">LaSER</a> at <a href= "http://www.unimi.it/"> University of Milan</a>.<BR><BR><B>Lecture outline</B><BR><BR>1. Introduction<BR>2. Background<BR>3. CopperDroid: dynamic analysis of Android malware (part 1)<BR>4. CopperDroid: dynamic analysis of Android malware (part 2)

...
4 Videos (Gesamt 49 min), 1 Lektüre, 1 Quiz
4 Videos
Background 12m
Dynamic analysis of Android malware (part 1) 15m
Dynamic analysis of Android malware (part 2) 10m
1 Lektüre
Module Four Reading10m
1 praktische Übung
Week 4 — Mobile malware52m

Dozent

Avatar

Dr Lorenzo Cavallaro

Reader (Associate Professor)
Information Security Group, Royal Holloway, University of London

Über University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

Häufig gestellte Fragen

  • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

  • Wenn Sie ein Zertifikat erwerben, erhalten Sie Zugriff auf alle Kursmaterialien, einschließlich bewerteter Aufgaben. Nach Abschluss des Kurses wird Ihr elektronisches Zertifikat zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn Profil hinzufügen. Wenn Sie nur lesen und den Inhalt des Kurses anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..