About this Course

1,929 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 19 hours to complete

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 19 hours to complete

English

Subtitles: English

Offered by

University of London logo

University of London

Syllabus - What you will learn from this course

Week
1

Week 1

3 hours to complete

Introduction

3 hours to complete
12 videos (Total 115 min), 1 reading, 1 quiz
12 videos
Should we care? A botnet takeover storytelling11m
Admin blabbing 11m
Malicious Software (part 1) 10m
Malicious Software (part 2) 9m
(a glimpse at) Botnets (part 1) 10m
(a glimpse at) Botnets (part 2) 6m
(a glimpse at) Botnets (part 3) 10m
(a glimpse at) Botnets detection and Rootkits (part 1)8m
(a glimpse at) Botnets detection and Rootkits (part 2)9m
(a glimpse at) Botnets detection and Rootkits (part 3)11m
(a glimpse at) Botnets detection and Rootkits (part 4)13m
1 reading
Module One Reading10m
1 practice exercise
Week 1 — Quiz50m
Week
2

Week 2

3 hours to complete

Static analysis and its limitations

3 hours to complete
8 videos (Total 99 min), 1 reading, 1 quiz
8 videos
(a glimpse at) Reverse engineering (part 1.1) 11m
(a glimpse at) Reverse engineering (part 1.2) 11m
(a glimpse at) Reverse engineering (part 1.3) 8m
(a glimpse at) Reverse engineering (part 2) 9m
(a glimpse at) Polymorphism, code obfuscation 18m
IDA Pro—a very simple example. . . (part 1) 10m
IDA Pro—a very simple example. . . (part 2) 13m
1 reading
Module Two Reading10m
1 practice exercise
Week 2 — Quiz1h 4m
Week
3

Week 3

3 hours to complete

Dynamic analysis and its limitations

3 hours to complete
7 videos (Total 87 min), 1 reading, 1 quiz
7 videos
(a glimpse at) Dynamic analysis (part 1.1) 11m
(a glimpse at) Dynamic analysis (part 1.2) 14m
(a glimpse at) Dynamic analysis (part 2.1) 10m
(a glimpse at) Dynamic analysis (part 2.2) 9m
(a glimpse at) Limits of dynamic analysis 11m
AccessMiner — system-centric models 15m
1 reading
Module Three Reading10m
1 practice exercise
Week 3 — Dynamic analysis and its limitations1h 2m
Week
4

Week 4

2 hours to complete

Mobile malware

2 hours to complete
4 videos (Total 49 min), 1 reading, 1 quiz
4 videos
Background 12m
Dynamic analysis of Android malware (part 1) 15m
Dynamic analysis of Android malware (part 2) 10m
1 reading
Module Four Reading10m
1 practice exercise
Week 4 — Mobile malware52m

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.