|
|
||||||||||||||||
Aims/Description: The module provides an in depth view of threat hunting in memory, file system and network data and an introductory analysis of malicious programs. Practical sessions will elaborate on key concepts of incident handling, cyber threat hunting and digital investigation along with detailed analysis of real world case studies. We will also introduce some unusual and non-virulent types of malware.
Information on the department responsible for this unit (Computer Science):
URLs used in these pages are subject to year-on-year change. For this reason we recommend that you do not bookmark these pages or set them as favourites. Teaching methods and assessment displayed on this page are indicative for 2025-26.
|