Module Details
Module Code: |
ANAL |
Module Title:
|
Basic Malware Analysis
|
Title:
|
Basic Malware Analysis
|
Module Level:: |
8 |
Module Coordinator: |
Nigel Whyte
|
Module Author:: |
Joseph Kehoe
|
Module Description: |
To provide learners with a theoretical knowledge of, and practical skills with, Reverse Engineering and Malware Analysis of Software Systems.
|
Learning Outcomes |
On successful completion of this module the learner will be able to: |
# |
Learning Outcome Description |
LO1 |
Identify and Analyse Malware |
LO2 |
Use Industry Standard Tools for Malware Analysis and Reverse Engineering |
LO3 |
Understand the Techniques used in the Development of Malware |
Dependencies |
Module Recommendations
This is prior learning (or a practical skill) that is recommended before enrolment in this module.
|
No recommendations listed |
Co-requisite Modules
|
No Co-requisite modules listed |
Additional Requisite Information
|
No Co Requisites listed
|
Indicative Content |
Fundamentals
Overview of Malware, Techniques used in Malware, Approaches to Reverse Engineering, Ethics
|
Tools
Disassemblers, Debuggers, Process System and Network Monitoring, Code Analysis
|
Techniques
Data Encoding, Obfuscating and De-obfuscating, DLL Injection, Function Hooking, Keylogging, HTTP Communication, Memory Overflow
|
Reverse Engineering
Unpacking Software, Behavioural Analysis, Code Analysis
|
Malware
Analyzing Office and PDF documents, Analyzing Web based Malware, Rootkit Analysis
|
Module Content & Assessment
|
Assessment Breakdown | % |
Continuous Assessment | 10.00% |
Project | 15.00% |
Practical | 15.00% |
End of Module Formal Examination | 60.00% |
AssessmentsFull Time
End of Module Formal Examination |
|
Reassessment Requirement |
Exam Board
It is at the discretion of the Examination Board as to what the qualifying criteria are.
|
SETU Carlow Campus reserves the right to alter the nature and timings of assessment
Module Workload
Workload: Full Time |
Workload Type |
Workload Category |
Contact Type |
Workload Description |
Frequency |
Average Weekly Learner Workload |
Hours |
Lecture |
|
Contact |
No Description |
12 Weeks per Stage |
1.00 |
12 |
Independent Learning |
|
Non Contact |
No Description |
15 Weeks per Stage |
5.93 |
89 |
Laboratory |
|
Contact |
Practical |
12 Weeks per Stage |
2.00 |
24 |
Total Weekly Contact Hours |
3.00 |
Module Resources
|
Recommended Book Resources |
---|
-
Michael Sikorski, Andrew Honig. Practical Malware Analysis, No Starch Press, p.760, [ISBN: 1593272901].
| Supplementary Book Resources |
---|
-
Daniel Regalado. Shon Harris. Allen Harper. Chris Eagle. Jonathan Ness. Branko Spasojevic. Ryan Linn. Stephen Sims.. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition, ; McGraw-Hill Osborne Media, [ISBN: 0071832386].
-
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard. Malware Analyst's Cookbook and DVD, Wiley, p.744, [ISBN: 0470613033].
-
Black Hat Python, ; No Starch Press, San Francisco, [ISBN: 1593275900].
-
TJ O'Connor. Violent Python, Syngress, p.288, [ISBN: 1597499579].
| This module does not have any article/paper resources |
---|
This module does not have any other resources |
---|
|