Malware Analysis

Take a deep dive in the functionality, origin and potential impact of a given malware sample such as a virus,

worm, trojan horse, rootkit, or backdoor.

  • This course is currently under development and will soon be available for registration.

  • If you are interested in contributing to the course materials, please feel free to contact us here.

Previous
Previous

Cybersecurity for IT Professionals

Next
Next

Cybersecurity for Executives