課程資料
課程簡介
Practical Ethical Hacking: Learn Security Techniques and Defensive Strategies Against Modern Malware
In this course, you will learn how modern malware techniques work from an ethical hacking and cybersecurity research perspective. The focus of this training is to understand how attackers operate so that security professionals can better detect, analyze, and defend against these threats.
We will start by demonstrating how security researchers build and analyze malware samples in controlled lab environments. You will see how payloads can be embedded into files and how these techniques are studied during penetration testing and red team exercises.
Next, we will explore how attackers attempt to compromise fully updated and patched systems. These demonstrations are performed strictly in isolated testing environments to help students understand real‑world attack methodologies and how organizations can defend against them.
The course will also cover the important phase of post‑exploitation and maintaining access, showing how security testers simulate persistence techniques during authorized penetration tests.
Throughout the course, we will examine how modern security solutions such as antivirus, firewalls, and endpoint protection systems attempt to detect malicious activity. By understanding these mechanisms, students will gain valuable insights into both offensive security techniques and defensive strategies.
Disclaimer
Important: All demonstrations in this course are performed in controlled lab environments and are intended strictly for educational and defensive cybersecurity purposes. Students must follow all applicable laws and ethical guidelines. Unauthorized interception of data, attacks on networks, or use of these techniques on systems without permission is strictly prohibited.
課程章節
- 9 個章節
- 24 堂課
- 第 1 章 Introduction
- 第 2 章 MetaSploit Crash Course
- 第 3 章 Introduction to Veil 3.0 Framework
- 第 4 章 Create Payload with Veil 3.0
- 第 5 章 Payload Binding Methods
- 第 6 章 Launch an Attack
- 第 7 章 Post Attack and Persistence Connection
- 第 8 章 How to Defend Malware Attacks
- 第 9 章 Additional Materials
課程內容
- You will be able to bypass any up-to-date antivirus, You will learn advance payload creation, You will Learn How to bind your payload with image file, You will Learn How to change extension of your payload to jpg, You will learn how to maintain access once you have gain it
評價
-
KKobi Sheree Zemek
great course all round, I earned heaps. thank you!
-
LLê Hoàng Cao Nguyên
The information provided by the instructor is by far the most useful I have learned so it would be reasonable to give this course high rating.
-
QQui Nay
It was very difficult to hear the instructor due to bad microphone or something. The course doesn't feel complete as others which includes veil training. Only halfway in completing the course but maybe this course felt a bit rushed.
-
GGray
I was hoping for more technical development of exploits rather than just using frameworks such as metasploit and veil to produce them