Making Viruses, Malware And Spyware 101

As we have said in several of our courses, “it takes a hacker to catch a hacker.” In order to this you must learn all the techniques, the technology and the mind set of a hacker.

Need to track your employees or children computer activities at all times? Ever had need to keep tabs on your spouse while they use your computer? Are you law enforcement and need to create spyware to track a suspects illegal activities.

NCSU will teach you how to install, configure and deploy powerful computer spy software that allows you to monitor EVERYTHING users do on your computer – in total stealth.

This course is broken down into 2 main sections:

Section 1 – You will create spyware, viruses or malware using the 4 of the most popular open source viruses makers. These are real viruses and malware, not demos.

You will learn:

Learn how to make a virus
Learn how to make malware
Learn how to install malware on a cell phones
Learn what the features of some viruses are
Learn how to hide a virus once executed
How to configure the software to run without being detected
Learn how to automatically log everything a user does
Learn how to make the program automatically start when the computer is turned on
Learn how to have all monitored activity sent to you via email
Section 2 – You will learn to use the 4 mst popular anti-spyware/virus/malware programs to see if the viruses you created can be detected or undetected.

Download the top 5 anti-spyware/virus/malware programs
Install each program to see if it can detect the spyware/virus/malware you just created

You will learn:

How to configure the software to run without being detected
Learn how to automatically log everything a user does
Learn how to make the program automatically start when the computer is turned on
Learn how to have all monitored activity sent to you via email
Learn what all the software monitors
This course comes with all software shown in this course:

Includes software used and demonstrated in the training
No certificate given
Course Curriculum
Getting Started….

Course Discussion
The Top 30 Most Dangerous Viruses Of All Time…
Computer Security Dictionary
The Different Between A Virus, Worm and Malware

What Is Malware – Types, Prevention & Treatment – Part 1
What Is Malware – Types, Prevention & Treatment – Part 2
Phishing Scams and Social Engineering
Understanding Viruses And How Anti-Viruses Work
How to Make a Virus

Virus Making Video
DarkHorse Virus Maker for Windows
DeadLine’s Virus Maker for Windows
Poison Virus Maker for Windows
SonicBat Virus Maker for Windows
How To Perform A Phishing Attack
How to Make a Worm

Ghost Eye Worm Video
Ghost Eye Worm Program Files for Windows
Internet Worm Maker Thing Video
Internet Worm Maker Thing Program for Windows
How to Deploy Malware
Spyware

Spyware Installation and Features Video
Spytech SpyAgent Program Demo for Windows
Lan Turtle – Stealth Remote Access, Network intelligence Gathering
Lan Turtle – Stealth Remote Access
Anti-Spyware Experiment
12:21

How To Detect Malware
Malware Analysis
What Should You Look For
What Are The Best Type Of Malware Software To Use
Source:http://www.nationalcybersecurityuniversity.net/courses/making-viruses-and-spyware-101

. . . . . . . .

Leave a Reply