I'm happy to announce the new Advanced Malware Analysis course I've been working for eight years is coming out soon as a part of the EU academic project ENGENSEC financed by the European Commission. In light of the recent nation-state cyber attacks, I'm glad for being related to educating the next generation of cybersecurity experts being able to counteract cyber attacks at any level.
The course will be adopted by universities in Ukraine, Sweden, Poland, and other partners. It will include theoretical and practical classes on the latest types of cyber attacks, analysis, detection, and prevention technologies totaling 270 hours (7.5 ECTS). You can find the course content below.
The course will be presented during the Summer School for students and Train the Trainer workshop for teachers this summer in Lviv Polytechnic National University.
Finally, I'd like to thank everyone who has contributed to this course, namely:
- Anders Carlsson, BTH
- Dragos Ilie, BTH
- Dmitriy Komashinskiy, F-Secure
- Vladimir Obrizan, Design and Test Lab
We welcome security and academic organizations to join the reviewing process.
Our contacts:
- anders.carlsson (at) bth.se - the general manager of the ENGENSEC project
- oleksandr.adamov (at) nure.ua - the Malware Analysis course manager of the ENGENSEC project
Malware Analysis course content
Lectures:
- History of computer threats
- Classification of computer threats
- Attack techniques and infection vectors
- Disassembly
- Phishing
- Online banking threats
- Ransomware: cryptolockers
- Botnets
- Mobile threats in iOS
- Mobile threats in Android
- Social networking threats
- Vulnerabilities and exploits
- Drive-by attacks
- Rootkits/bootkits
- Targeted attacks and industrial malware
- Incident response
Labs:
- Malware Detection and Removal
- Malware Static Analysis
- Malware Dynamic Analysis
- Analysis of Exploits
- Reverse Engineering x86/ARM
- Advanced Unpacking
- Rootkits
- Android Malware Analysis
- Data Mining with RapidMiner
- Data Mining with Maltego
Practice:
- Analysis of host-based attributes for phishing URLs
- x86 Disassembly: Typical C Constructs
- x86 Disassembly: Analysis of decryption (deobfuscation) routine used by malware
Demos:
- Analysis of CozyDuke APT
- Static Analysis PE
- x86 ASM and Debugging
- Exploits: Stack Overrun
- Debugging Android CrackMe
- Analysis of spear phishing attacks
- Analysis of TeslaCrypt ransomware
- Analysis of XData ransomware
- Analysis of NotPetya cyber attack
Other ENGENSEC courses:
- Advanced Network and Cloud Security
- Wireless and Mobile Security
- Secure Software Development
- Web Security
- Pentest and Ethical Hacking
- Digital Forensics
No comments:
Post a Comment