Saturday, 8 July 2017

New Cyber Security Course for Master Students




I'm happy to announce the new Malware Analysis course I've been working for eight years is coming out soon as a part of the EU academic project ENGENSEC financed by the European Commission. In light of the recent nation-state cyber attacks, I'm glad for being related to educating the next generation of cyber security experts being able to counteract cyber attacks at any level.

The course will be adopted by universities in Ukraine, Sweden, Poland, and other partners. It will include theoretical and practical classes on the latest types of cyber attacks, analysis, detection, and prevention technologies totaling 270 hours (7.5 ECTS). You can find the course content below.

The course will be presented during the Summer School for students and Train the Trainer workshop for teachers this summer in Lviv Polytechnic National University.

Finally, I'd like to thank everyone who has contributed to this course, namely:
  • Anders Carlsson, BTH
  • Dragos Ilie, BTH
  • Dmitriy Komashinskiy, F-Secure
  • Vladimir Obrizan, Design and Test Lab

We welcome security and academic organizations to join the reviewing process.
Our contacts:
  • anders.carlsson (at) bth.se - the general manager of the ENGENSEC project
  • oleksandr.adamov (at) nure.ua - the Malware Analysis course manager of the ENGENSEC project
Malware Analysis course content

Lectures:
  1. History of computer threats
  2. Classification of computer threats
  3. Attack techniques and infection vectors
  4. Disassembly
  5. Phishing
  6. Online banking threats
  7. Ransomware: cryptolockers
  8. Botnets
  9. Mobile threats in iOS
  10. Mobile threats in Android
  11. Social networking threats
  12. Vulnerabilities and exploits
  13. Drive-by attacks
  14. Rootkits/bootkits
  15. Targeted attacks and industrial malware
  16. Incident response
Labs:
  1. Malware Detection and Removal
  2. Malware Static Analysis
  3. Malware Dynamic Analysis
  4. Analysis of Exploits
  5. Reverse Engineering x86/ARM
  6. Advanced Unpacking
  7. Rootkits
  8. Android Malware Analysis
  9. Data Mining with RapidMiner
  10. Data Mining with Maltego
Practice:
  1. Analysis of host-based attributes for phishing URLs
  2. x86 Disassembly: Typical C Constructs
  3. x86 Disassembly: Analysis of decryption (deobfuscation) routine used by malware
Demos:
  1. Analysis of CozyDuke APT
  2. Static Analysis PE
  3. x86 ASM and Debugging
  4. Exploits: Stack Overrun
  5. Debugging Android CrackMe
  6. Analysis of spear phishing attacks
  7. Analysis of TeslaCrypt ransomware
  8. Analysis of XData ransomware
  9. Analysis of NotPetya cyber attack
  • Advanced Network and Cloud Security
  • Wireless and Mobile Security
  • Secure Software Development
  • Web Security
  • Pentest and Ethical Hacking
  • Digital Forensics

No comments:

Post a Comment