Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA CompTIA Security+ Microsoft AZ-900
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Mobile Game Development
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Personal Development Neuro-Linguistic Programming Personal Transformation Life Purpose Mindfulness Sound Therapy CBT Cognitive Behavioral Therapy Coaching
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Internet Marketing Google Analytics Copywriting Email Marketing Startup YouTube Marketing
2022-05-30T22:15:14Z

IT & SoftwareNetwork & SecurityNetwork Security

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101
Rating: 4.7 out of 54.7 (350 ratings)
6,714 students
Created by Hacking School, IT Security Academy
Last updated 5/2022
English
English [Auto]

What you'll learn

  • Over 30 lectures and 10 hours of content!
  • Lectures in PDF + Live Video Training
  • Free source code package to download
  • How to create shellcode
  • How to inject code
  • How to hide processes, files, directories and registry entries
  • How to keep a rootkit in a system
  • How to create a backdoor
  • How to create an invisible keylogger and remote console
  • How to make a screenshot
  • Creating undetectable applications
  • How to deceive Anti-Virus applications
  • How to use anti-emulation techniques
  • How to bypass a firewall
  • How to create a rootkit detector
  • How to protect against rootkits

Requirements

  • interest in ITsec and ethical hacking
  • some IT and programming basics (C/C++)

Description

LAST UPDATED: 5/2022

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. - definition by Wikipedia

  • You can ignore the fact that rootkits really exist,

  • You can pretend that goverment agencies don't use rootkits,

  • You can even believe that big companies don't spend huge amount of money for developing malicious software that can spy on you and your family,

  • You can just turn a blind eye on it and ignore these fact.


But it does not make the problem disappear.

Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

What you can expect from this course:

  • You'll learn how to create shellcode

  • You'll learn how to inject code into processes

  • You'll learn how to hide processes, files, directories and registry entries

  • You'll learn how to keep a rootkit in a system

  • You'll learn how to create a backdoor

  • You'll learn how to create an invisible keylogger and remote console

  • You'll learn how to make a screenshot

  • You'll learn how to create undetectable applications

  • You'll learn how to deceive Anti-Virus applications

  • You'll learn how to use anti-emulation techniques

  • You'll learn how to bypass a firewall

  • You'll learn how to create a rootkit detector

  • You'll learn how to protect against rootkits

  • And many other interesting topics


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || ITsec Academy || Hacking School Team

Who this course is for:

  • students interested in rootkit development
  • ethical hackers
  • system and network administrators
  • everyone interested in ethical hacking in general
  • ISA CISS, CEH, CISSP, MCSE, CCNA

Instructors

Hacking School
IT Security Experts - We turn beginners into professionals.
Hacking School
  • 3.9 Instructor Rating
  • 9,294 Reviews
  • 194,267 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

IT Security Academy
IT Security Certified Professional
IT Security Academy
  • 3.9 Instructor Rating
  • 9,294 Reviews
  • 194,267 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.