I’m happy to announce the new Malware Analysis course I’ve been working for eight years is coming out soon as a part of the EU academic project ENGENSEC financed by the European Commission. In light of the recent nation-state cyber attacks, I feel responsible for educating the next generation of cyber security experts being able to counteract cyber attacks at any level.
The course will be adopted by universities in Ukraine, Sweden, Poland, and other partners. It will include theoretical and practical classes on the latest types of cyber attacks, analysis, detection, and prevention technologies totaling 270 hours (7.5 ECTS). You can find the course content below.
The course will be presented during the Summer School for students and Train the Trainer workshop for teachers this summer in Lviv Polytechnic National University.
Finally, I’d like to thank everyone who has contributed to this course, namely:
- Anders Carlsson, BTH
- Dragos Ilie, BTH
- Dmitriy Komashinskiy, F-Secure
- Vladimir Obrizan, Design and Test Lab
We welcome security and academic organizations to take a part in the reviewing process.
- anders.carlsson (at) bth.se - the general manager of the ENGENSEC project
- oleksandr.adamov (at) nure.ua - the Malware Analysis course manager of the ENGENSEC project
- History of computer threats
- Classification of computer threats
- Attack techniques and infection vectors
- Disassembly
- Phishing
- Online banking threats
- Ransomware: cryptolockers
- Botnets
- Mobile threats in iOS
- Mobile threats in Android
- Social networking threats
- Vulnerabilities and exploits
- Drive-by attacks
- Rootkits/bootkits
- Targeted attacks and industrial malware
- Incident response
- Malware Detection and Removal
- Malware Static Analysis
- Malware Dynamic Analysis
- Analysis of Exploits
- Reverse Engineering x86/ARM
- Advanced Unpacking
- Rootkits
- Android Malware Analysis
- Data Mining with RapidMiner
- Data Mining with Maltego
- Analysis of host-based attributes for phishing URLs
- x86 Disassembly: Typical C Constructs
- x86 Disassembly: Analysis of decryption (deobfuscation) routine used by malware
- Analysis of CozyDuke APT
- Static Analysis PE
- x86 ASM and Debugging
- Exploits: Stack Overrun
- Debugging Android CrackMe
- Analysis of spear phishing attacks
- Analysis of TeslaCrypt ransomware
- Analysis of XData ransomware
- Analysis of NotPetya cyber attack
- Advanced Network and Cloud Security
- Wireless and Mobile Security
- Secure Software Development
- Web Security
- Pentest and Ethical Hacking
- Digital Forensics
Article Link: http://nioguard.blogspot.com/2017/07/new-cyber-security-course-for-master.html