Skip to content
This repository has been archived by the owner on Nov 16, 2022. It is now read-only.

Latest commit

 

History

History
27 lines (25 loc) · 795 Bytes

README.md

File metadata and controls

27 lines (25 loc) · 795 Bytes

Educational Material

Below are rough outlines of topics that were covered during each semester. The semesters alternate between defensive and offensive security topics.

  • Semester 1
    • Types of malware analysis
    • Hashing of files
    • Fuzzy hashing of files
    • File analysis
    • Reverse engineering via decompilation
    • Static malware analysis using Ghidra
  • Semester 2
    • Reverse engineering
    • Port scanning
    • Firewalls
    • Web security
    • Buffer overflows
  • Semester 3
    • CTF practicals
    • Basic malware analysis
    • Projects
  • Semester 4
    • Graphs: Control Flow Graphs, Malware Visualization
    • Crypto: Hashing, Encryption
    • Hatching Triage
    • Malware Development
    • Ghidra (Reverse Engineering)