Video Lectures Report a problem
Having trouble viewing lectures? Try changing players. Your current player format is html5. Change to flash.
Week 1 — Introduction
(collapsed, click to expand)- Completed Course Teaser — Introduction (01:11)
- Completed
(Should we care? A botnet takeover storytelling) (11:39)
Introduction for (Should we care? A botnet takeover storytelling) (11:39)Subtitles (text) for (Should we care? A botnet takeover storytelling) (11:39)Subtitles (srt) for (Should we care? A botnet takeover storytelling) (11:39)Video (MP4) for (Should we care? A botnet takeover storytelling) (11:39)
- Completed Admin blabbing (11:38)
- Completed Malicious Software (20:09)
- Completed (a glimpse at) Botnets (26:09)
- Completed
(a glimpse at) Botnets detection and Rootkits (42:42)
(a glimpse at) Botnets detection and Rookits for (a glimpse at) Botnets detection and Rootkits (42:42)Subtitles (text) for (a glimpse at) Botnets detection and Rootkits (42:42)Subtitles (srt) for (a glimpse at) Botnets detection and Rootkits (42:42)Video (MP4) for (a glimpse at) Botnets detection and Rootkits (42:42)
Week 2 — Static analysis and its limitations
(collapsed, click to expand)- Completed Early days, AV industry (15:36)
- Completed
(a glimpse at) Reverse engineering (part 1) (30:41)
(a glimpse at) Reverse engineering (part 1) for (a glimpse at) Reverse engineering (part 1) (30:41)Subtitles (text) for (a glimpse at) Reverse engineering (part 1) (30:41)Subtitles (srt) for (a glimpse at) Reverse engineering (part 1) (30:41)Video (MP4) for (a glimpse at) Reverse engineering (part 1) (30:41)
- Completed
(a glimpse at) Reverse engineering (part 2) (09:06)
(a glimpse at) Reverse engineering (part 2) for (a glimpse at) Reverse engineering (part 2) (09:06)Subtitles (text) for (a glimpse at) Reverse engineering (part 2) (09:06)Subtitles (srt) for (a glimpse at) Reverse engineering (part 2) (09:06)Video (MP4) for (a glimpse at) Reverse engineering (part 2) (09:06)
- Completed
(a glimpse at) Polymorphism, code obfuscation (18:23)
(a glimpse at) Polymorphism, code obfuscation for (a glimpse at) Polymorphism, code obfuscation (18:23)Subtitles (text) for (a glimpse at) Polymorphism, code obfuscation (18:23)Subtitles (srt) for (a glimpse at) Polymorphism, code obfuscation (18:23)Video (MP4) for (a glimpse at) Polymorphism, code obfuscation (18:23)
- Completed IDA Pro—a very simple example. . . (24:17)
- Completed reverse-ex — the binary (to download)
- Completed reverse-ex.c — the C source (to download)
- Toward dynamic analysis (15:05)
- (a glimpse at) Dynamic analysis (part 1) (25:59)
- (a glimpse at) Dynamic analysis (part 2) (19:14)
-
(a glimpse at) Limits of dynamic analysis (11:31)
(a glimpse at) Limits of dynamic analysis for (a glimpse at) Limits of dynamic analysis (11:31)Subtitles (text) for (a glimpse at) Limits of dynamic analysis (11:31)Subtitles (srt) for (a glimpse at) Limits of dynamic analysis (11:31)Video (MP4) for (a glimpse at) Limits of dynamic analysis (11:31)
- AccessMiner — system-centric models (10:38)