Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Won't Get Fooled Again - The Expected Future of IoT Malware and What to Do About It

via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course covers the history and evolution of IoT malware, focusing on evasion techniques and detection methods. By studying past malware instances like Creeper, Stuxnet, and lot Worm, learners will understand the motives behind malware creation and the future trends in evasive malware. The course teaches skills in malware detection techniques, static and dynamic evasion methods, and the different categories of motives driving malware development. The teaching method involves analyzing historical case studies and predicting future trends in IoT malware. This course is intended for cybersecurity professionals, malware analysts, and individuals interested in understanding the evolving landscape of IoT malware.

Syllabus

Intro
Creeper and Reaper (1971)
Brain (1986)
Concept (1995)
Blaster (2003)
Stuxnet (2010)
History of Malware Evasion
Growth of Evasive Malware
Morris Worm (1988)
Polymorphic Viruses (1990's)
Blue Pill (2006) - Joanna Rutkowska
lot Worm (2016) - Ronen, O'Flynn, Shamir, Weingarten
Malware Detection Techniques
Malware Evasion - Static
Malware Evasion - Dynamic
Categories of Motive
Motive: Proof of Concept
Creeper (1971) – Bob Thomas
Motive: Destructive
CIH (1998)
Motive: Profit
Motive: Cyber Operations
Malware and lot
Prediction: Malware will evade anti-malware

Reviews

Start your review of Won't Get Fooled Again - The Expected Future of IoT Malware and What to Do About It

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.