mirror of
https://github.com/prakhar1989/awesome-courses.git
synced 2025-01-30 17:53:23 -05:00
Add Malware Analysis course
Add Malware Analysis - CSCI 4976, from Rensselaer Polytechnic Institute.
This commit is contained in:
parent
5bf33c3324
commit
699098aa6f
10
README.md
10
README.md
@ -594,6 +594,16 @@ Topics covered include probability theory and Bayesian inference; univariate dis
|
||||
- The Web continues to grow in popularity as platform for retail transactions, financial services, and rapidly evolving forms of communication. It is becoming an increasingly attractive target for attackers who wish to compromise users' systems or steal data from other sites. Browser vendors must stay ahead of these attacks by providing features that support secure web applications. This course will study vulnerabilities in existing web browsers and the applications they render, as well as new technologies that enable web applications that were never before possible. The material will be largely based on current research problems, and students will be expected to criticize and improve existing defenses. Topics of study include (but are not limited to) browser encryption, JavaScript security, plug-in security, sandboxing, web mashups, and authentication.
|
||||
- [CS 259](https://courseware.stanford.edu/pg/courses/331628/cs259-winter-2013) **Security Modeling and Analysis** *Stanford* <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4dd.png" width="20" height="20" alt="Lecture Notes" title="Lecture Notes" /> <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4bb.png" width="20" height="20" alt="Assignments" title="Assignments" /> <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4da.png" width="20" height="20" alt="Readings" title="Readings" />
|
||||
- The course will cover a variety of contemporary network protocols and other systems with security properties. The course goal is to give students hands-on experience in using automated tools and related techniques to analyze and evaluate security mechanisms. To understand security properties and requirements, we will look at several network protocols and their properties, including secrecy, authentication, key establishment, and fairness. In parallel, the course will look at several models and tools used in security analysis and examine their advantages and limitations. In addition to fully automated finite-state model checking techniques, we will also study other approaches, such as constraint solving, process algebras, protocol logics, probabilistic model checking, game theory, and executable models based on logic programming.
|
||||
- [CSCI 4976](https://github.com/RPISEC/Malware) **Malware Analysis** *Rensselaer Polytechnic Institute* <img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4dd.png" width="20" height="20" alt="Lecture Notes" title="Lecture Notes" /><img src="https://assets-cdn.github.com/images/icons/emoji/unicode/1f4bb.png" width="20" height="20" alt="Assignments" title="Assignments" />
|
||||
- This repository contains the materials as developed and used by [RPISEC](http://rpis.ec) to
|
||||
teach Malware Analysis at [Rensselaer Polytechnic Institute](http://rpi.edu) in
|
||||
Fall 2015. This was a university course developed and run soley by students, primarily using the
|
||||
[Practical Malware Analysis](http://www.amazon.com/Practical-Malware-Analysis-Dissecting-Malicious/dp/1593272901)
|
||||
book by Michael Sikorski and Andrew Honig, to teach skills in reverse engineering, malicious behaviour, malware,
|
||||
and anti-analysis techniques.
|
||||
[Lectures Notes](https://github.com/RPISEC/Malware/tree/master/Lectures)
|
||||
[Labs](https://github.com/RPISEC/Malware/tree/master/Labs)
|
||||
[Projects](https://github.com/RPISEC/Malware/tree/master/Projects)
|
||||
|
||||
-------
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user