Lectures:
1. Artificial intelligence and artificial life, Self-replicated structure (the game of life, Fredkin's self-replicated structures, von Neumann and the theory of self-replicated automata). Artificial life and virtual universe (tierra biomorf, SBEAT, SBART, Eden SWIMBOOT). Artificial Life and Complex Systems.
2. Self-replicated structure, finite automata and Turing machines. Virus definitions, common and different features of biological virus. Classification of malicious code (viruses, adware, spyware, worms ,...) and its spreading code. HOAX. Generators viruses.
3. Malicious code and its dependence on the environment (eg OS, file format, processor architecture, compilers, ...)
4. Methods of infection. Infections files (COM, EXE, API, MBR, DBR, infection ...), art (overwriting viruses, connecting viruses, hollow viruses hidden point ...). Infection of memory, using suspension, swap viruses.
5. Basic defensive strategy of viruses. Scanning the memory trace, anti-debugging, armored viruses, retroviruses, defense against heuristic analysis, emulation and reversing disassembled, use undocumented functions.
6. Creation and generation of viruses. Code of the virus encoded by viruses (decryptor, nonlinear decoding W95/fono, W95/Mad2736) oligomorphic viruses, polymorphic viruses, metamorphic viruses. Generators viruses.
7. Basics of computer networks. Network scanning. Security of Web servers. Scanning ports.
8.Google Hacking. Buffer overflow - buffer overflows. Windows Security accounts.
9. Spam and anti-spam. Spam definitions and history. Tools for fighting spam. Anti-spam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters.
10. Phishing. Phishing subcategories as spam. Right, phishing and spyware. False identity and false redirects identity. Phishing and Malware. Cracking. Protection Program. Anti - debug and anti - disasembler programs.
11. Hacking gathering, scanning and survey scanning programs, network services and research. Operating systems and attack them. Mac OS X, Windows and Linux.
12. Computer networks and attacks on them. Survey networks, autonomous systems, network services. Wireless and network attacks.Firewall.
13. Attacks on the code, runs on the web. Preventing the incident.implementation of security policies and procedures. Investigation procedures and computer investigations. Trace data and network control.
14. Investigation of the OS, Windows, Unix, Web attacks, hacker tools.Computer viruses, antivirus and Artificial Intelligence
Exercise in PC classrooms
- Basics of penetration testing
- Mapping of vulnerability of computer systems
- SQL injection
- Cross Site Scripting (XSS)
- Forgering Cross Site Request and Session Hijacking (CSFR)
- Denial of service (DoS)
- Remote shell command execution
- Password cracking (Brutal force and dictionary attack)
- Testing the vulnerability of WEP and WPA / WPA2
- Use Matasploit framework for penetration testing
- Computer viruses - the basic structure
- Computer viruses - Advanced Techniques
1. Artificial intelligence and artificial life, Self-replicated structure (the game of life, Fredkin's self-replicated structures, von Neumann and the theory of self-replicated automata). Artificial life and virtual universe (tierra biomorf, SBEAT, SBART, Eden SWIMBOOT). Artificial Life and Complex Systems.
2. Self-replicated structure, finite automata and Turing machines. Virus definitions, common and different features of biological virus. Classification of malicious code (viruses, adware, spyware, worms ,...) and its spreading code. HOAX. Generators viruses.
3. Malicious code and its dependence on the environment (eg OS, file format, processor architecture, compilers, ...)
4. Methods of infection. Infections files (COM, EXE, API, MBR, DBR, infection ...), art (overwriting viruses, connecting viruses, hollow viruses hidden point ...). Infection of memory, using suspension, swap viruses.
5. Basic defensive strategy of viruses. Scanning the memory trace, anti-debugging, armored viruses, retroviruses, defense against heuristic analysis, emulation and reversing disassembled, use undocumented functions.
6. Creation and generation of viruses. Code of the virus encoded by viruses (decryptor, nonlinear decoding W95/fono, W95/Mad2736) oligomorphic viruses, polymorphic viruses, metamorphic viruses. Generators viruses.
7. Basics of computer networks. Network scanning. Security of Web servers. Scanning ports.
8.Google Hacking. Buffer overflow - buffer overflows. Windows Security accounts.
9. Spam and anti-spam. Spam definitions and history. Tools for fighting spam. Anti-spam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters.
10. Phishing. Phishing subcategories as spam. Right, phishing and spyware. False identity and false redirects identity. Phishing and Malware. Cracking. Protection Program. Anti - debug and anti - disasembler programs.
11. Hacking gathering, scanning and survey scanning programs, network services and research. Operating systems and attack them. Mac OS X, Windows and Linux.
12. Computer networks and attacks on them. Survey networks, autonomous systems, network services. Wireless and network attacks.Firewall.
13. Attacks on the code, runs on the web. Preventing the incident.implementation of security policies and procedures. Investigation procedures and computer investigations. Trace data and network control.
14. Investigation of the OS, Windows, Unix, Web attacks, hacker tools.Computer viruses, antivirus and Artificial Intelligence
Exercise in PC classrooms
- Basics of penetration testing
- Mapping of vulnerability of computer systems
- SQL injection
- Cross Site Scripting (XSS)
- Forgering Cross Site Request and Session Hijacking (CSFR)
- Denial of service (DoS)
- Remote shell command execution
- Password cracking (Brutal force and dictionary attack)
- Testing the vulnerability of WEP and WPA / WPA2
- Use Matasploit framework for penetration testing
- Computer viruses - the basic structure
- Computer viruses - Advanced Techniques