About this Course

Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 12 hours to complete
English
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 12 hours to complete
English

Offered by

Placeholder

University of London

Syllabus - What you will learn from this course

Week
1

Week 1

3 hours to complete

Introduction

3 hours to complete
12 videos (Total 115 min), 1 reading, 1 quiz
12 videos
Should we care? A botnet takeover storytelling11m
Admin blabbing 11m
Malicious Software (part 1) 10m
Malicious Software (part 2) 9m
(a glimpse at) Botnets (part 1) 10m
(a glimpse at) Botnets (part 2) 6m
(a glimpse at) Botnets (part 3) 10m
(a glimpse at) Botnets detection and Rootkits (part 1)8m
(a glimpse at) Botnets detection and Rootkits (part 2)9m
(a glimpse at) Botnets detection and Rootkits (part 3)11m
(a glimpse at) Botnets detection and Rootkits (part 4)13m
1 reading
Module One Reading10m
1 practice exercise
Week 1 — Quiz30m
Week
2

Week 2

2 hours to complete

Static analysis and its limitations

2 hours to complete
8 videos (Total 99 min), 1 reading, 1 quiz
8 videos
(a glimpse at) Reverse engineering (part 1.1) 11m
(a glimpse at) Reverse engineering (part 1.2) 11m
(a glimpse at) Reverse engineering (part 1.3) 8m
(a glimpse at) Reverse engineering (part 2) 9m
(a glimpse at) Polymorphism, code obfuscation 18m
IDA Pro—a very simple example. . . (part 1) 10m
IDA Pro—a very simple example. . . (part 2) 13m
1 reading
Module Two Reading10m
1 practice exercise
Week 2 — Quiz30m
Week
3

Week 3

2 hours to complete

Dynamic analysis and its limitations

2 hours to complete
7 videos (Total 87 min), 1 reading, 1 quiz
7 videos
(a glimpse at) Dynamic analysis (part 1.1) 11m
(a glimpse at) Dynamic analysis (part 1.2) 14m
(a glimpse at) Dynamic analysis (part 2.1) 10m
(a glimpse at) Dynamic analysis (part 2.2) 9m
(a glimpse at) Limits of dynamic analysis 11m
AccessMiner — system-centric models 15m
1 reading
Module Three Reading10m
1 practice exercise
Week 3 — Dynamic analysis and its limitations30m
Week
4

Week 4

1 hour to complete

Mobile malware

1 hour to complete
4 videos (Total 49 min), 1 reading, 1 quiz
4 videos
Background 12m
Dynamic analysis of Android malware (part 1) 15m
Dynamic analysis of Android malware (part 2) 10m
1 reading
Module Four Reading10m
1 practice exercise
Week 4 — Mobile malware30m

Frequently Asked Questions

More questions? Visit the Learner Help Center.