Instructor |
Mr. Frankie F.K. Li
|
Teaching assistants |
Mr. Wing Cheong Virchow Chan
Mr. Ka Kin Ken Ma
|
Syllabus |
This course provides students a foundational knowledge about reverse
engineering and malware analysis, through the study of various cases and
hand-on analysis of malware samples. It covers fundamental concepts in
malware investigations so as to equip the students with enough background
knowledge in handling malicious software attacks. Various malware incidents
will be covered, such as cases in Ransomware, banking-trojan,
state-sponsored and APT attacks, cases in Stuxnet and malicious software
attacks on Industrial Control System and IoT devices. With the experience of
studying these cases and analyzing selected samples, the students will be
able to understand the global cyber security landscape and its future
impact. Hands-on exercises and in-depth discussion will be provided to
enable students to acquire the required knowledge and skill set for
defending and protecting an enterprise network environment. |
Introduction by Instructor |
Cyber Security has become the top priority for any organizations in
protecting their digital assets or online activities. Modern sophisticated
adversaries can easily find vulnerabilities and make exploits to launch
attacks for financial gains or as a way to achieve specific objectives.
Cases of denial-of-service attacks to business servers, leakage of business
and customer private information, advance malware attacks, fraudulent and
malicious websites are found very common in daily news. This module provides
you basic knowledge in malware analysis processes and their complexities as
well as illustrate on how to build an analytical capability best suited
enterprises environment. The tools and techniques presented in this course
are intended for students to analyze selected samples in virtualization
test-bed, so they can think like a blackhat to understand the TTP of malware
authors. |
Learning Outcomes |
|
Pre-requisites |
Students should have
programming/development skills (Assembly, C, C++, Python) and knowledge in
Operating System and computer network. |
Compatibility |
Mutually exclusive with: COMP7804
E-commerce security cases and technologies. |
Topics covered |
|
Assessment |
|
Course materials |
Recommended readings:
- Practical Malware Analysis: The Hands-On Guide to
Dissection Malicious Software by Michael Sikorski and Andrew
Honig, (Mar 3, 2012)
- The Art of Memory Forensics: Detecting Malware and
Threats in Windows, Linux, and Mac Memory by Michael Hale
Ligh, Andrew Case, Jamie Levy, AAron Walters, 1st Edition,
2014.
|
Session dates |
|
Add/drop |
1 September, 2017 - 14 September, 2017 |
Quota |
100 |