CYBF 685 Malware Detection, Analysis, and Prevention
Explores malware, such as Trojans, droppers, and rootkits, used to gain access to computer systems and examines the infiltration methods and resultant artifacts that appear as a result of malware infections. Students will examine the role and behavior of bot networks and analyze carrier files, such as malicious PDFs, scripts, and executables. Students will isolate and analyze malware from behavioral and static approaches.
Prerequisite
None