Description
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING, the training course on creating and tracking Rootkits is published by Udemy Academy. The practical application of the lesson you’re about to see has been proven by thousands of people around the world – beginners and computer geeks alike. People taking their first steps in the field of computer, network and professional security: network administrators, programmers, intruders, black and white hat hackers. Please read carefully what we are about to share with you. A rootkit is a type of secret software that is usually malicious and is designed to hide the existence of some processes or programs from the usual detection methods and enables continuous access to the computer. We decided to face the facts and show you how rootkits work, how they can hide inside your system, how to make such software invisible, how to detect them and fight against them. It protects against threats. In this course, all the important techniques related to rootkits and the creation of intrusive software used by hackers, system administrators, testers and legal IT analysts are covered.
What you will learn
- How to create shellcode
- How to inject code
- How to hide processes, files, directories and registry entries
- How to keep a rootkit on a system
- How to create a backdoor
- How to make an invisible keylogger and remote console
- How to create a screenshot
- Create undetectable applications
- How to trick antivirus applications
- How to use anti-emulation techniques
- How to bypass the firewall
- How to build a rootkit tracker
- How to protect yourself from rootkits
Who is this course suitable for?
- Students interested in rootkit development
- Ethical hackers
- System and network administrators
- Generally everyone is interested in ethical hacking
- ISA CISS, CEH, CISSP, MCSE, CCNA
Description of the course Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
- Publisher: Udemy
- teacher : Hacking School , IT Security Academy
- English language
- Education level: all levels
- Number of courses: 39
- Training duration: 5 hours and 30 minutes
Head of the course chapters on 2023-8
Course prerequisites
- interest in ITsec and ethical hacking
- some IT and programming basics (C/C++)
Pictures
Sample video
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 720p
download link
File(s) password: www.downloadly.ir
Size
881 MB
Be the first to comment