Complete Ethical Hacking Series: Malware Development
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
13 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Malware Development to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Malware Development

Complete Ethical Hacking Series (CEHv9): Malware Development
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
13 students enrolled
Created by Chad Russell
Last updated 7/2017
English
English [Auto-generated]
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Upon completion of this course you will be able to create your own malware such as custom Trojans, viruses and defend against malware using sandboxing and malware analysis tools.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Malware Development

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!    Each chapter closes with exercises putting your new learned skills into practical use immediately.   

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Internet Worm Maker - Internet Worm Maker Thing is a free tool by which you can make many types of viruses and worms. Through this tool, you can make viruses and worms that can infect victim's drives, files, shows message, disable Anti-Virus Software and much more. It comes along with a compiler by which you can easily convert your batch virus into executable to evade Anti-Virus or any other purpose.


  • Ghost Eye - Ghost Eye is a nasty trojan infection which enters to the target system with peer to peer file sharing process, removable storage device, downloading audio and video files from unsecured sites and many others. It slow down the system running process and also leads to issue like system crash, data loss or hamper of important hardware components. The main aim of this virus is to steal privacy details like credit card number, online banking login details and others. It access user PC information with the use of key loggers which record the online and activities and send to the remote hackers.


  • JPS Virus Maker - JPS Virus Maker has less features than Internet Worm Maker Thing and DelMe Virus Maker. However it has some features that are not available in Internet Worm Maker Thing and DelMe Virus Maker.


  • Custom Trojans - While the original Trojan Horse was used to sneak Greeks into Troy, the common meaning today actually refers to the payload that gets deposited on your computer. Trojans typically grant a hacker remote access to your computer.


  • Static Malware Analysis - Basic static analysis examines malware without viewing the actual code or instructions. It employs different tools and techniques to quickly determine whether a file is malicious or not, provide information about its functionality and collect technical indicators to produce simple signatures. Technical indicators gathered with basic static analysis can include file name, MD5 checksums or hashes, file type, file size and recognition by antivirus detection tools.


  • Dynamic Malware Analysis - Basic dynamic analysis actually runs malware to observe its behavior, understand its functionality and identify technical indicators which can be used in detection signatures. Technical indicators revealed with basic dynamic analysis can include domain names, IP addresses, file path locations, registry keys, additional files located on the system or network.


  • Sandboxing  - Automation of malware analysis.  
Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Complete Ethical Hacking Series: Malware Development
8 Lectures 55:19

Internet Worm Maker
03:19

JPS Virus Maker
03:36


Custom Trojan
02:56

Static Malware Analysis
13:55

Sandboxing and Malware Analysis
05:12

MSFVenom and Malware Payload Generation
09:13
About the Instructor
Chad Russell
3.8 Average rating
1,118 Reviews
22,781 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!