- Joined
- Nov 19, 2023
- Messages
- 2,718
- Reaction score
- 25,148
- Points
- 113
- Thread Author
- #1
What you’ll learn
- Over 30 lectures and 10 hours of content!
- Lectures in PDF + Live Video Training
- Free source code package to download
- How to create shellcode
- How to inject code
- How to hide processes, files, directories and registry entries
- How to keep a rootkit in a system
- How to create a backdoor
- How to create an invisible keylogger and remote console
- How to make a screenshot
- Creating undetectable applications
- How to deceive Anti-Virus applications
- How to use anti-emulation techniques
- How to bypass a firewall
- How to create a rootkit detector
- How to protect against rootkits
Requirements
- interest in ITsec and ethical hacking
- some IT and programming basics (C/C++)
Who this course is for:
- students interested in rootkit development
- ethical hackers
- system and network administrators
- everyone interested in ethical hacking in general
- ISA CISS, CEH, CISSP, MCSE, CCNA
To see this hidden content, you must react with one of the following reactions : Like, Love, Wow
To see this hidden content, you must react with one of the following reactions : Like, Love, Wow