Lectures:
Course structure
Introduction to cybersecurity
History and motivation behind the development of malicious software
Malicious software – types and classification
Infection mechanisms
Malware operating environment
Armored viruses and defense mechanisms
Virus creation and generation
Computer worms
Malicious effect (payload)
Backups as a defense against malware
Artificial intelligence and malware
Spyware and cyber weapons
------- Bonus lectures depending on workload during the semester -------
Fractals and malware visualization
Computer viruses – from basics to the future
The dark web, darknet, and its role in the malware ecosystem
Exercises in PC classrooms
Keylogger
Windows API, registries, permissions
PowerShell, Alternate stream
DLL injection
Symmetric encryption
Static malware analysis 1
Static malware analysis 2
Dynamic malware analysis
Practical malware analysis
Automatic malware analysis using Cuckoo Sandbox
Student presentations
Course structure
Introduction to cybersecurity
History and motivation behind the development of malicious software
Malicious software – types and classification
Infection mechanisms
Malware operating environment
Armored viruses and defense mechanisms
Virus creation and generation
Computer worms
Malicious effect (payload)
Backups as a defense against malware
Artificial intelligence and malware
Spyware and cyber weapons
------- Bonus lectures depending on workload during the semester -------
Fractals and malware visualization
Computer viruses – from basics to the future
The dark web, darknet, and its role in the malware ecosystem
Exercises in PC classrooms
Keylogger
Windows API, registries, permissions
PowerShell, Alternate stream
DLL injection
Symmetric encryption
Static malware analysis 1
Static malware analysis 2
Dynamic malware analysis
Practical malware analysis
Automatic malware analysis using Cuckoo Sandbox
Student presentations