About the training
This module teaches students the skills and toolsets required for in-depth investigations of modern malware and understanding what malicious impacts it can have on systems. The module has a particular emphasis put on more advanced topics such as Reverse Engineering and Debugging. In this context, Reverse Engineering involves using tools to break down (disassembling) software to see what that malicious code does and debugging involves analysing the malicious code's behaviour.
This module teaches students the skills and toolsets required for in-depth investigations of modern malware and understanding what malicious impacts it can have on systems. The module has a particular emphasis put on more advanced topics such as Reverse Engineering and Debugging. In this context, Reverse Engineering involves using tools to break down (disassembling) software to see what that malicious code does and debugging involves analysing the malicious code's behaviour.
What you will learn
LO1 Examine a commercial Operating System as an attack platform for malicious code LO2 Appraise malware using a disassembler and a debugger to examine its inner workings. LO3 Use reversing tools to identify common assembly level patterns in malware code. LO4 Analyse threats associated with malicious documents such as PDF. LO5 Assess complex evidence and communicate subject knowledge clearly to specialist and non-specialist audiences.
LO1 Examine a commercial Operating System as an attack platform for malicious code LO2 Appraise malware using a disassembler and a debugger to examine its inner workings. LO3 Use reversing tools to identify common assembly level patterns in malware code. LO4 Analyse threats associated with malicious documents such as PDF. LO5 Assess complex evidence and communicate subject knowledge clearly to specialist and non-specialist audiences.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Anila Mjeda- Anila.mjeda@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Anila Mjeda- Anila.mjeda@mtu.ie