Malware

 

 


 

Customize your search:

E.g., 2016-12-08
E.g., 2016-12-08
E.g., 2016-12-08
Apr 27th 2015

Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.

Average: 6 (1 vote)
Self Paced Course - Start anytime

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

No votes yet
Self Paced Course - Start anytime

A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.

No votes yet