CYBF 685 Malware Detection, Analysis, and Prevention

Explores malware, such as Trojans, droppers, and rootkits, used to gain access to computer systems and examines the infiltration methods and resultant artifacts that appear as a result of malware infections. Students will examine the role and behavior of bot networks and analyze carrier files, such as malicious PDFs, scripts, and executables. Students will isolate and analyze malware from behavioral and static approaches.

Credits

3

Prerequisite

None