[Coursera] Malicious Software and its Underground Economy
File Information:
- Magnet Link:Magnet Link
- File Size:782.61 MB
- Creat Time:2014-11-29
- Active Degree:350
- Last Active:2024-10-31
- File Tags:Coursera Malicious Software and its Underground Economy
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- 2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4 102.65 MB
- 2 - 5 - (a glimpse at) Botnets (26_09).mp4 75.55 MB
- 2 - 4 - Malicious Software (20_09).mp4 58.28 MB
- 3 - 5 - IDA Pro—a very simple example. . . (24_17).mp4 58.27 MB
- 3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp4 52.84 MB
- 3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp4 33.17 MB
- 2 - 3 - Admin blabbing (11_38).mp4 33.17 MB
- 4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp4 30.46 MB
- 3 - 1 - Early days, AV industry (15_36).mp4 29.65 MB
- 6 - 2 - Pay-per-install (23.55) .mp4 25.08 MB
- 7 - 1 - Investigating China_'s online underground economy (23_32).mp4 25.03 MB
- 7 - 1 - Investigating China's online underground economy (23_32).mp4 25.03 MB
- 4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp4 23.48 MB
- 2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp4 19.02 MB
- 4 - 1 - Toward dynamic analysis (15_05).mp4 17.63 MB
- 5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp4 16.89 MB
- 6 - 1 - Introduction (15_58).mp4 16.84 MB
- 3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp4 16.03 MB
- 6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp4 15.97 MB
- 6 - 4 - Exploit-as-a-Service (15_03).mp4 15.94 MB
- 4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp4 14.08 MB
- 7 - 2 - Measuring the cost of cybercrime (12_31).mp4 13.89 MB
- 4 - 5 - AccessMiner — system-centric models (10_38).mp4 13.52 MB
- 5 - 2 - Background (12_27).mp4 13.41 MB
- 5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp4 12.59 MB
- 5 - 1 - Introduction (10_24).mp4 11.29 MB
- 7 - 3 - Concluding remarks (8_17).mp4 9.26 MB
- 2 - 1 - Course Teaser — Introduction (01_11).mp4 3.06 MB
- 2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).srt 54 KB
- 3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).srt 40 KB
- 4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).srt 34 KB
- 2 - 5 - (a glimpse at) Botnets (26_09).srt 32 KB
- 6 - 2 - Pay-per-install (23.55) .srt 31 KB
- 7 - 1 - Investigating China's online underground economy (23_32).srt 31 KB
- 3 - 5 - IDA Pro—a very simple example. . . (24_17).srt 30 KB
- 2 - 4 - Malicious Software (20_09).srt 27 KB
- 4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).srt 25 KB
- 3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).srt 22 KB
- 6 - 1 - Introduction (15_58).srt 21 KB
- 6 - 5 - Memory errors_ the past, the present, and the future (15_30).srt 21 KB
- 5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).srt 20 KB
- 4 - 1 - Toward dynamic analysis (15_05).srt 20 KB
- 3 - 1 - Early days, AV industry (15_36).srt 19 KB
- 6 - 4 - Exploit-as-a-Service (15_03).srt 19 KB
- 7 - 2 - Measuring the cost of cybercrime (12_31).srt 17 KB
- 5 - 2 - Background (12_27).srt 17 KB
- 2 - 3 - Admin blabbing (11_38).srt 15 KB
- 4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).srt 14 KB
- 5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).srt 14 KB
- 4 - 5 - AccessMiner — system-centric models (10_38).srt 14 KB
[Coursera] Malicious Software and its Underground Economy
Hot Tags: