University of Cincinnati – A Full Malware Analysis

University of Cincinnati – a Full Malware Analysis

Introduction to Malware Analysis and Reverse Engineering

This class will introduce the CS students to malware concepts, malware analysis, and black-box reverse engineering techniques. The target audience is focused on computer science undergraduate and graduate students without prior cyber security or malware experience. It is intended to introduce the students to types of malware, common attack recipes, some tools, and a wide array of malware analysis techniques.

In general, if you have taken the following courses, you should have a good foundation for the class:

  • CS4029/6029 – Operating Systems
  • CS2029 – Data Structures

 

Course syllabus

  • Syllabus (Subject to Change)

Lectures / Notes

  • 2019-01-15 – Introduction to Malware Analysis (Lecture)
  • 2019-01-17 – Introduction to Malware (Lecture)
  • 2019-01-22 – Virtualization (Lecture)
  • 2019-01-24 – Virtualization and Sandboxes (Lecture)
  • 2019-01-29 – Static Analysis (Lecture)
  • 2019-01-31 – x86 Introduction (Lecture)
  • 2019-02-05 – Dynamic Analysis (Lecture)
  • 2019-02-07 – Dynamic Analysis (Lecture)
  • 2019-02-12 – Document Analysis (Lecture)
  • 2019-02-14 – Document In-Class Analysis (Lecture)
  • 2019-02-19 – In-Class Analysis (Lecture)
  • 2019-02-21 – Windows Artifacts & Online Analysis (Lecture)
  • 2019-02-26 – Network Analysis (Lecture)
  • 2019-02-28 – Network Analysis In Class Work (Lecture)
  • 2019-03-05 – Static Analyzers (vscan, ClamAV, Yara) (Lecture)
  • 2019-03-07 – Static Analyzers — inclass Work (Lecture)
  • 2019-03-12 – Communication (Lecture)
  • 2019-03-26 – Reverse Engineering (Lecture)
  • 2019-04-02 – Process Injection (Lecture)
  • 2019-04-04 – Process Injection — inclass work (Lecture)

 

Direct Download Link

Sales Page: http://class.snusbaum.com/

Leave a Reply

Your email address will not be published. Required fields are marked *