FileMood

Download [Coursera] Malicious Software and its Underground Economy

Coursera Malicious Software and its Underground Economy

Name

[Coursera] Malicious Software and its Underground Economy

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

820.6 MB

Total Files

55

Hash

DE79A02A4317FF7695F8ECC571E385635907E2F5

/

2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4

107.6 MB

2 - 5 - (a glimpse at) Botnets (26_09).mp4

79.2 MB

2 - 4 - Malicious Software (20_09).mp4

61.1 MB

3 - 5 - IDA Pro—a very simple example. . . (24_17).mp4

61.1 MB

3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp4

55.4 MB

3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp4

34.8 MB

2 - 3 - Admin blabbing (11_38).mp4

34.8 MB

4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp4

31.9 MB

3 - 1 - Early days, AV industry (15_36).mp4

31.1 MB

6 - 2 - Pay-per-install (23.55) .mp4

26.3 MB

7 - 1 - Investigating China_'s online underground economy (23_32).mp4

26.2 MB

7 - 1 - Investigating China's online underground economy (23_32).mp4

26.2 MB

4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp4

24.6 MB

2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp4

19.9 MB

4 - 1 - Toward dynamic analysis (15_05).mp4

18.5 MB

5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp4

17.7 MB

6 - 1 - Introduction (15_58).mp4

17.7 MB

3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp4

16.8 MB

6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp4

16.7 MB

6 - 4 - Exploit-as-a-Service (15_03).mp4

16.7 MB

4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp4

14.8 MB

7 - 2 - Measuring the cost of cybercrime (12_31).mp4

14.6 MB

4 - 5 - AccessMiner — system-centric models (10_38).mp4

14.2 MB

5 - 2 - Background (12_27).mp4

14.1 MB

5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp4

13.2 MB

5 - 1 - Introduction (10_24).mp4

11.8 MB

7 - 3 - Concluding remarks (8_17).mp4

9.7 MB

2 - 1 - Course Teaser — Introduction (01_11).mp4

3.2 MB

2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).srt

54.8 KB

3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).srt

40.1 KB

4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).srt

34.0 KB

2 - 5 - (a glimpse at) Botnets (26_09).srt

32.4 KB

6 - 2 - Pay-per-install (23.55) .srt

31.6 KB

7 - 1 - Investigating China's online underground economy (23_32).srt

31.4 KB

3 - 5 - IDA Pro—a very simple example. . . (24_17).srt

30.5 KB

2 - 4 - Malicious Software (20_09).srt

26.8 KB

4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).srt

24.7 KB

3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).srt

21.9 KB

6 - 1 - Introduction (15_58).srt

21.2 KB

6 - 5 - Memory errors_ the past, the present, and the future (15_30).srt

21.0 KB

5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).srt

20.1 KB

4 - 1 - Toward dynamic analysis (15_05).srt

20.0 KB

3 - 1 - Early days, AV industry (15_36).srt

19.4 KB

6 - 4 - Exploit-as-a-Service (15_03).srt

19.2 KB

7 - 2 - Measuring the cost of cybercrime (12_31).srt

16.6 KB

5 - 2 - Background (12_27).srt

16.5 KB

2 - 3 - Admin blabbing (11_38).srt

14.8 KB

4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).srt

14.3 KB

5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).srt

14.2 KB

4 - 5 - AccessMiner — system-centric models (10_38).srt

13.7 KB

5 - 1 - Introduction (10_24).srt

13.2 KB

7 - 3 - Concluding remarks (8_17).srt

11.8 KB

3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).srt

11.4 KB

_README.txt

2.9 KB

2 - 1 - Course Teaser — Introduction (01_11).srt

1.4 KB

 

Total files 55


Copyright © 2025 FileMood.com