To support our site, Class Central may be compensated by some course providers.

Malicious Software and its Underground Economy: Two Sides to Every Story

University of London International Programmes via Coursera

students interested
  • Provider Coursera
  • Subject Computer Science
  • $ Cost Free Online Course (Audit)
  • Session Finished
  • Language English
  • Certificate Paid Certificate Available
  • Effort 5-10 hours a week
  • Start Date

Taken this course? Share your experience with other students. Write review

Overview

Sign up to Coursera courses for free Learn how

Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.

Malicious Software and its Underground Economy: Two Sides to Every Story is a short, introductory, and experimental (i.e., pilot) course featuring 6 lectures. Each lecture lasts roughly anything between 1h and 1.5h and is logically divided in a number of ~15 mins self-contained units. Although a non-negligible effort has been made to fulfill this breakdown, some units last definitely longer and require a bit more effort---just pause the video and take a break ;-)

In addition, the course features 6 multiple-choices mandatory quizzes (i.e., 1 per lecture) and 1 bonus quiz. Passing all the mandatory quizzes awards a "pass" mark of the course, while passing all the mandatory quizzes and the bonus one awards a "distinction" mark.

Taught by

Lorenzo Cavallaro of Royal Holloway

Help Center

Most commonly asked questions about Coursera Coursera

Reviews for Coursera's Malicious Software and its Underground Economy: Two Sides to Every Story
3.8 Based on 5 reviews

  • 5 stars 40%
  • 4 star 0%
  • 3 stars 60%
  • 2 star 0%
  • 1 star 0%

Did you take this course? Share your experience with other students.

Write a review
  • 1
Anonymous
5.0 4 years ago
Dexter completed this course.
It's the great course. It let me know more about how the malicious code attack and work and how we identify or response to that code. This course is suitable for the student who has a knowledge about programming, software engineering or information security a little bit.
1 person found
this review helpful
Was this review helpful to you? Yes
Bobby B
5.0 4 years ago
by Bobby completed this course, spending 4 hours a week on it and found the course difficulty to be medium.
One of my all time favorite MOOC's. Introduced me to assembly, cyber crime research and was the motivation for my shift towards the information security industry.

Mostly theory and lecture with some x86 assembly, debugging and C sprinkled in. In order to get a verified certificate you had to analyze a file in a debugger to find a secret message.

Leonardo's work on the sinkholed Torpig botnet was an exciting and rare focus for the class and shouldn't be missed.
Was this review helpful to you? Yes
Mattia M
3.0 4 years ago
Mattia completed this course, spending 4 hours a week on it and found the course difficulty to be easy.
1 person found
this review helpful
Was this review helpful to you? Yes
Shigeru M
3.0 3 years ago
Shigeru completed this course.
Was this review helpful to you? Yes
Marjolein V
3.0 3 years ago
Marjolein completed this course.
Was this review helpful to you? Yes
  • 1

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.