Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

University of London International Programmes

Malicious Software and its Underground Economy: Two Sides to Every Story

University of London International Programmes via Coursera

This course may be unavailable.

Overview

Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.

Malicious Software and its Underground Economy: Two Sides to Every Story is a short, introductory, and experimental (i.e., pilot) course featuring 6 lectures. Each lecture lasts roughly anything between 1h and 1.5h and is logically divided in a number of ~15 mins self-contained units. Although a non-negligible effort has been made to fulfill this breakdown, some units last definitely longer and require a bit more effort---just pause the video and take a break ;-)

In addition, the course features 6 multiple-choices mandatory quizzes (i.e., 1 per lecture) and 1 bonus quiz. Passing all the mandatory quizzes awards a "pass" mark of the course, while passing all the mandatory quizzes and the bonus one awards a "distinction" mark.

Taught by

Lorenzo Cavallaro of Royal Holloway

Reviews

3.8 rating, based on 5 Class Central reviews

Start your review of Malicious Software and its Underground Economy: Two Sides to Every Story

  • One of my all time favorite MOOC's. Introduced me to assembly, cyber crime research and was the motivation for my shift towards the information security industry.
    Mostly theory and lecture with some x86 assembly, debugging and C sprinkled in. In order to get a verified certificate you had to analyze a file in a debugger to find a secret message.
    Leonardo's work on the sinkholed Torpig botnet was an exciting and rare focus for the class and shouldn't be missed.
  • Dexter Moregan
    It's the great course. It let me know more about how the malicious code attack and work and how we identify or response to that code. This course is suitable for the student who has a knowledge about programming, software engineering or information security a little bit.
  • Mattia Monga
  • Shigeru Matsumiya
  • Marjolein V

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.