{"id":2217,"date":"2020-03-18T10:03:27","date_gmt":"2020-03-18T10:03:27","guid":{"rendered":"https:\/\/isf.tvz.hr\/?p=2217"},"modified":"2020-04-07T18:09:50","modified_gmt":"2020-04-07T18:09:50","slug":"malware-forensic","status":"publish","type":"post","link":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/","title":{"rendered":"Malware Forensic"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-0 fusion-one-third fusion-column-first 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" width=\"450\" height=\"686\" alt=\"\" title=\"covjek_stoji_450\" class=\"lazyload img-responsive wp-image-2264\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27450%27%20height%3D%27686%27%20viewBox%3D%270%200%20450%20686%27%3E%3Crect%20width%3D%27450%27%20height%3D%273686%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-200x305.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-400x610.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg 450w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 450px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-1 fusion-two-third fusion-column-last 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:30px;\"><h3 class=\"title-heading-left\" style=\"margin:0;color:#d20000;\">Semester 3 \/ ECTS Credits: 5 ECTS<\/h3><\/div><div class=\"fusion-text\"><h3>Course Description:<\/h3>\n<p>The main objective of this course is to give short and focused introduction to malware forensic analysis with emphasis on malware analysis techniques.<br \/>\nStudents will gain comprehensive knowledge and practical skills of the topics covered with theories, concepts, and hands-on exercises.<br \/>\nThe course covers strategies and techniques for analyzing even the most sophisticated malicious programs. It also shows when to use specified technique and why. Basics of malware collection and detecting are presented with memory forensic techniques and tools. Executable code analysis is introduced with various tools and techniques. Interesting topics such as memory analysis, PDFs, and Office documents analyses for suspicious content, basics of reverse engineering common encoding and encryption algorithms are covered too. At the end of course, sandboxes and their purpose is explained on different examples.<br \/>\nPractical skills will be obtained during lab work using virtual machines and isolated lab network by working on real-life scenarios.<\/p>\n<h3>Learning Outcomes:<\/h3>\n<ol>\n<li>Perform system analysis on malware impact.<\/li>\n<li>Create reports on malware digital forensic analysis.<\/li>\n<li>Apply processes of malware identification and analysis.<\/li>\n<li>Malware identification and classification.<\/li>\n<li>Analyze malware behavior.<\/li>\n<li>Malware analysis on Windows operating systems.<\/li>\n<li>Malware analysis on Linux operating systems.<\/li>\n<\/ol>\n<h3>Course content lectures:<\/h3>\n<ol>\n<li>Introduction to the Malware Forensics<\/li>\n<li>Taxonomy of malicious code<\/li>\n<li>Malware threats<\/li>\n<li>Legal aspects<\/li>\n<li>Creating safe environment for malware analysis<\/li>\n<li>Types of analysis: dynamic, static, hybrid<\/li>\n<li>Monitoring computer processes<\/li>\n<li>Analysis of computer registry<\/li>\n<li>Extraction and analysis of malware<\/li>\n<li>Tools for malware analysis<\/li>\n<li>Monitoring and analysis of network<\/li>\n<li>PDF and Microsoft office vulnerabilities<\/li>\n<li>Static malware analysis<\/li>\n<li>Linux and MAC malware analysis<\/li>\n<li>Sandbox<\/li>\n<li>Creating reports on malware analysis<\/li>\n<\/ol>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-1 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-1 .fusion-popover, .fusion-fullwidth.fusion-builder-row-1 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-1 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Semester 3 \/ ECTS Credits: 5 ECTS<\/p>\n","protected":false},"author":1,"featured_media":2417,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[21],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Forensic - TVZ - Information Security and Digital Forensics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Forensic - TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"og:description\" content=\"Semester 3 \/ ECTS Credits: 5 ECTS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/\" \/>\n<meta property=\"og:site_name\" content=\"TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T10:03:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-07T18:09:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"webadmin1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isf.tvz.hr\/#website\",\"url\":\"https:\/\/isf.tvz.hr\/\",\"name\":\"TVZ - Information Security and Digital Forensics\",\"description\":\"Study Programme\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isf.tvz.hr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#primaryimage\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\",\"contentUrl\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg\",\"width\":800,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#webpage\",\"url\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/\",\"name\":\"Malware Forensic - TVZ - Information Security and Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\/\/isf.tvz.hr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#primaryimage\"},\"datePublished\":\"2020-03-18T10:03:27+00:00\",\"dateModified\":\"2020-04-07T18:09:50+00:00\",\"author\":{\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\"},\"breadcrumb\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isf.tvz.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Forensic\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\",\"name\":\"webadmin1\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/#personlogo\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"caption\":\"webadmin1\"},\"url\":\"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Forensic - TVZ - Information Security and Digital Forensics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/","og_locale":"hr_HR","og_type":"article","og_title":"Malware Forensic - TVZ - Information Security and Digital Forensics","og_description":"Semester 3 \/ ECTS Credits: 5 ECTS","og_url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/","og_site_name":"TVZ - Information Security and Digital Forensics","article_published_time":"2020-03-18T10:03:27+00:00","article_modified_time":"2020-04-07T18:09:50+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"webadmin1","Procijenjeno vrijeme \u010ditanja":"5 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/isf.tvz.hr\/#website","url":"https:\/\/isf.tvz.hr\/","name":"TVZ - Information Security and Digital Forensics","description":"Study Programme","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isf.tvz.hr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#primaryimage","inLanguage":"hr","url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","contentUrl":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_3.jpg","width":800,"height":400},{"@type":"WebPage","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#webpage","url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/","name":"Malware Forensic - TVZ - Information Security and Digital Forensics","isPartOf":{"@id":"https:\/\/isf.tvz.hr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#primaryimage"},"datePublished":"2020-03-18T10:03:27+00:00","dateModified":"2020-04-07T18:09:50+00:00","author":{"@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35"},"breadcrumb":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/malware-forensic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isf.tvz.hr\/"},{"@type":"ListItem","position":2,"name":"Malware Forensic"}]},{"@type":"Person","@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35","name":"webadmin1","image":{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/#personlogo","inLanguage":"hr","url":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","caption":"webadmin1"},"url":"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/"}]}},"_links":{"self":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2217"}],"collection":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/comments?post=2217"}],"version-history":[{"count":4,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2217\/revisions"}],"predecessor-version":[{"id":2542,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2217\/revisions\/2542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media\/2417"}],"wp:attachment":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media?parent=2217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/categories?post=2217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/tags?post=2217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}