Udemy

Practical Hacking: Undetectable Malware

立即報名
  • 2,755 名學生
  • 更新於 3/2026
4.2
(341 個評分)
CTgoodjobs 嚴選優質課程,為職場人士提升競爭力。透過本站連結購買Udemy課程,本站將獲得推廣佣金,有助未來提供更多實用進修課程資訊給讀者。

課程資料

報名日期
全年招生
課程級別
學習模式
修業期
1 小時 36 分鐘
教學語言
英語
評分
4.2
(341 個評分)
2次瀏覽

課程簡介

Practical Hacking: Undetectable Malware

Practical Ethical Hacking: Learn Security Techniques and Defensive Strategies Against Modern Malware

In this course, you will learn how modern malware techniques work from an ethical hacking and cybersecurity research perspective. The focus of this training is to understand how attackers operate so that security professionals can better detect, analyze, and defend against these threats.

We will start by demonstrating how security researchers build and analyze malware samples in controlled lab environments. You will see how payloads can be embedded into files and how these techniques are studied during penetration testing and red team exercises.

Next, we will explore how attackers attempt to compromise fully updated and patched systems. These demonstrations are performed strictly in isolated testing environments to help students understand real‑world attack methodologies and how organizations can defend against them.

The course will also cover the important phase of post‑exploitation and maintaining access, showing how security testers simulate persistence techniques during authorized penetration tests.

Throughout the course, we will examine how modern security solutions such as antivirus, firewalls, and endpoint protection systems attempt to detect malicious activity. By understanding these mechanisms, students will gain valuable insights into both offensive security techniques and defensive strategies.

Disclaimer

Important: All demonstrations in this course are performed in controlled lab environments and are intended strictly for educational and defensive cybersecurity purposes. Students must follow all applicable laws and ethical guidelines. Unauthorized interception of data, attacks on networks, or use of these techniques on systems without permission is strictly prohibited.


課程章節

  • 9 個章節
  • 24 堂課
  • 第 1 章 Introduction
  • 第 2 章 MetaSploit Crash Course
  • 第 3 章 Introduction to Veil 3.0 Framework
  • 第 4 章 Create Payload with Veil 3.0
  • 第 5 章 Payload Binding Methods
  • 第 6 章 Launch an Attack
  • 第 7 章 Post Attack and Persistence Connection
  • 第 8 章 How to Defend Malware Attacks
  • 第 9 章 Additional Materials

課程內容

  • You will be able to bypass any up-to-date antivirus, You will learn advance payload creation, You will Learn How to bind your payload with image file, You will Learn How to change extension of your payload to jpg, You will learn how to maintain access once you have gain it

評價

  • K
    Kobi Sheree Zemek
    5.0

    great course all round, I earned heaps. thank you!

  • L
    Lê Hoàng Cao Nguyên
    4.5

    The information provided by the instructor is by far the most useful I have learned so it would be reasonable to give this course high rating.

  • Q
    Qui Nay
    2.0

    It was very difficult to hear the instructor due to bad microphone or something. The course doesn't feel complete as others which includes veil training. Only halfway in completing the course but maybe this course felt a bit rushed.

  • G
    Gray
    2.0

    I was hoping for more technical development of exploits rather than just using frameworks such as metasploit and veil to produce them

立即關注瀏覽更多

本網站使用Cookies來改善您的瀏覽體驗,請確定您同意及接受我們的私隱政策使用條款才繼續瀏覽。

我已閱讀及同意