Reverse Engineering and Malware Analysis Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.
The detailed syllabus for Reverse Engineering and Malware Analysis M.Tech 2017-2018 (R17) first year second sem is as follows.
M.Tech. I Year II Sem.
UNIT – I: BASIC ANALYSIS: Basic Static Techniques, Malware Analysis in Virtual, Machines, Basic Dynamic Analysis
UNIT – II: ADVANCED STATIC ANALYSIS: A Crash Course in x86 Disassembly, IDA Pro, Recognizing C Code Constructs in Assembly Analyzing Malicious Windows Programs
UNIT – III: ADVANCED DYNAMIC ANALYSIS: Debugging, vi Brief Contents, Olly Dbg, Kernel Debugging with WinDbg
UNIT – IV: MALWARE FUNCTIONALITY: Malware Behavior, Covert Malware Launching, Data Encoding, Malware-Focused Network Signatures
UNIT V: ANTI-REVERSE-ENGINEERING: Anti-Disassembly, Anti-Debugging, Anti-Virtual Machine Techniques, Packers and Unpacking
TEXTBOOKS:
- Michael Sikorski and Andrew Honig, “Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software”, No Starch Press,2012.
REFERENCES:
- Jamie Butler and Greg Hoglund, “Rootkits: Subverting the Windows Kernel”, Addison-Wesley, 2005.
- Dang, Gazet, Bachaalany, “Practical Reverse Engineering”, Wiley, 2014.
- Reverend Bill Blunden, “The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System” Second Edition, Jones & Bartlett, 2012.
For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.
All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.
Do share with friends and in case of questions please feel free drop a comment.