About this Course

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 19 hours to complete

English

Subtitles: English
Learners taking this Course are
  • Security Engineers
  • Data Scientists
  • Software Engineers

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 19 hours to complete

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
3 hours to complete

Introduction

12 videos (Total 115 min), 1 reading, 1 quiz
12 videos
Should we care? A botnet takeover storytelling11m
Admin blabbing 11m
Malicious Software (part 1) 10m
Malicious Software (part 2) 9m
(a glimpse at) Botnets (part 1) 10m
(a glimpse at) Botnets (part 2) 6m
(a glimpse at) Botnets (part 3) 10m
(a glimpse at) Botnets detection and Rootkits (part 1)8m
(a glimpse at) Botnets detection and Rootkits (part 2)9m
(a glimpse at) Botnets detection and Rootkits (part 3)11m
(a glimpse at) Botnets detection and Rootkits (part 4)13m
1 reading
Module One Reading10m
1 practice exercise
Week 1 — Quiz50m
Week
2
3 hours to complete

Static analysis and its limitations

8 videos (Total 99 min), 1 reading, 1 quiz
8 videos
(a glimpse at) Reverse engineering (part 1.1) 11m
(a glimpse at) Reverse engineering (part 1.2) 11m
(a glimpse at) Reverse engineering (part 1.3) 8m
(a glimpse at) Reverse engineering (part 2) 9m
(a glimpse at) Polymorphism, code obfuscation 18m
IDA Pro—a very simple example. . . (part 1) 10m
IDA Pro—a very simple example. . . (part 2) 13m
1 reading
Module Two Reading10m
1 practice exercise
Week 2 — Quiz1h 4m
Week
3
3 hours to complete

Dynamic analysis and its limitations

7 videos (Total 87 min), 1 reading, 1 quiz
7 videos
(a glimpse at) Dynamic analysis (part 1.1) 11m
(a glimpse at) Dynamic analysis (part 1.2) 14m
(a glimpse at) Dynamic analysis (part 2.1) 10m
(a glimpse at) Dynamic analysis (part 2.2) 9m
(a glimpse at) Limits of dynamic analysis 11m
AccessMiner — system-centric models 15m
1 reading
Module Three Reading10m
1 practice exercise
Week 3 — Dynamic analysis and its limitations1h 2m
Week
4
2 hours to complete

Mobile malware

4 videos (Total 49 min), 1 reading, 1 quiz
4 videos
Background 12m
Dynamic analysis of Android malware (part 1) 15m
Dynamic analysis of Android malware (part 2) 10m
1 reading
Module Four Reading10m
1 practice exercise
Week 4 — Mobile malware52m

Instructor

Avatar

Dr Lorenzo Cavallaro

Reader (Associate Professor)
Information Security Group, Royal Holloway, University of London

About University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.