Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Malware Analysis: Course Outline

Malware is the conventional method through which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data.

Topics

  • Introduction to malwares

         - Definition, history
         - Classification of Malwares Virus, Rootkits, Worms, Trojans, Botnets, Spyware

  • Malware classification: Virus, Rootkits, Worms, Trojans, BotNets, Spyware etc.
  • Introduction to Malware Analysis techniques
  • Static Analysis and its limitations
  • Dynamic Analysis – Part 1
  • Dynamic Analysis - Part 2
  • Polymorphism and code obfuscation
  • Specialized cybercrimes – pay per install services (PPI)
  • Specialized cybercrimes – exploit as a service (EaaS)
  • Memory Errors
  • China’s underground economy
  • Underground economy of fake antivruses
  • Threats and the underground economy associated with the social networking websites - 1
  • Threats and the underground economy associated with the social networking websites - 2

Related Books (Full Text)