[Coursera] Malicious Software and its Underground Economy

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:782.61 MB
  3. Creat Time:2014-11-29
  4. Active Degree:350
  5. Last Active:2024-10-31
  6. File Tags:Coursera  Malicious  Software  and  its  Underground  Economy  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    [Coursera] Malicious Software and its Underground Economy

  1. 2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4 102.65 MB
  2. 2 - 5 - (a glimpse at) Botnets (26_09).mp4 75.55 MB
  3. 2 - 4 - Malicious Software (20_09).mp4 58.28 MB
  4. 3 - 5 - IDA Pro—a very simple example. . . (24_17).mp4 58.27 MB
  5. 3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp4 52.84 MB
  6. 3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp4 33.17 MB
  7. 2 - 3 - Admin blabbing (11_38).mp4 33.17 MB
  8. 4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp4 30.46 MB
  9. 3 - 1 - Early days, AV industry (15_36).mp4 29.65 MB
  10. 6 - 2 - Pay-per-install (23.55) .mp4 25.08 MB
  11. 7 - 1 - Investigating China_'s online underground economy (23_32).mp4 25.03 MB
  12. 7 - 1 - Investigating China's online underground economy (23_32).mp4 25.03 MB
  13. 4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp4 23.48 MB
  14. 2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp4 19.02 MB
  15. 4 - 1 - Toward dynamic analysis (15_05).mp4 17.63 MB
  16. 5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp4 16.89 MB
  17. 6 - 1 - Introduction (15_58).mp4 16.84 MB
  18. 3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp4 16.03 MB
  19. 6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp4 15.97 MB
  20. 6 - 4 - Exploit-as-a-Service (15_03).mp4 15.94 MB
  21. 4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp4 14.08 MB
  22. 7 - 2 - Measuring the cost of cybercrime (12_31).mp4 13.89 MB
  23. 4 - 5 - AccessMiner — system-centric models (10_38).mp4 13.52 MB
  24. 5 - 2 - Background (12_27).mp4 13.41 MB
  25. 5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp4 12.59 MB
  26. 5 - 1 - Introduction (10_24).mp4 11.29 MB
  27. 7 - 3 - Concluding remarks (8_17).mp4 9.26 MB
  28. 2 - 1 - Course Teaser — Introduction (01_11).mp4 3.06 MB
  29. 2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).srt 54 KB
  30. 3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).srt 40 KB
  31. 4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).srt 34 KB
  32. 2 - 5 - (a glimpse at) Botnets (26_09).srt 32 KB
  33. 6 - 2 - Pay-per-install (23.55) .srt 31 KB
  34. 7 - 1 - Investigating China's online underground economy (23_32).srt 31 KB
  35. 3 - 5 - IDA Pro—a very simple example. . . (24_17).srt 30 KB
  36. 2 - 4 - Malicious Software (20_09).srt 27 KB
  37. 4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).srt 25 KB
  38. 3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).srt 22 KB
  39. 6 - 1 - Introduction (15_58).srt 21 KB
  40. 6 - 5 - Memory errors_ the past, the present, and the future (15_30).srt 21 KB
  41. 5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).srt 20 KB
  42. 4 - 1 - Toward dynamic analysis (15_05).srt 20 KB
  43. 3 - 1 - Early days, AV industry (15_36).srt 19 KB
  44. 6 - 4 - Exploit-as-a-Service (15_03).srt 19 KB
  45. 7 - 2 - Measuring the cost of cybercrime (12_31).srt 17 KB
  46. 5 - 2 - Background (12_27).srt 17 KB
  47. 2 - 3 - Admin blabbing (11_38).srt 15 KB
  48. 4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).srt 14 KB
  49. 5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).srt 14 KB
  50. 4 - 5 - AccessMiner — system-centric models (10_38).srt 14 KB