This course is designed to equip students with Malware analysis skills, which are a critical requirement in the cybersecurity repertoire today. Throughout the course, students will learn to reverse engineer and analyze machine code. Students will be able to identify vulnerabilities in executable code and construct effective defenses against malicious attacks. The course will develop a strong set of skills for reverse-engineering malicious software using a variety of freely available tools. Students will learn to identify and acquire investigative leads from host and network-¬based indicators associated with malicious code and applications.
No class October 12 (Thanksgiving Weekend), November 9 (Rememberance Day Weekend). This is a CST BTech course. CST BTech courses are also open to non-bachelor program students. CST Bachelor program students have up to seven (7) years to complete the Bachelor program starting from the date of their first Technical degree-level course or the date of acceptance to the Bachelor program, WHICHEVER COMES FIRST.
This course offering is in progress. Please check back next term, subscribe to receive email updates or
us with your comments or questions.
Upon successful completion of this course, the student will be able to:
Explain the principles of malware incident response investigations.
Explain the procedures performed for the analysis of advance persistent threats.
Use a variety if malware analysis tools (IDA Pro, OllyDbg, WinDBG, ProcMon, Pe, wxHexEditor, etc) as part of malicious code identification and analysis.
Reverse engineer machine code in order to detect and analyze malware characteristics and behavior.
Analyze malware using static and dynamic analysis techniques.
Carry out file format analysis of various standard formats such as PDF, Flash, Word, Excel, etc.
Debug malware and modify control flow and logic of software.
Analyze assembly code and identify malicious code.
Effective as of Fall 2018
If you have a comment or question about this course, please complete and submit the form below.