Making Viruses, Malware And Spyware 101

As we have said in several of our courses, “it takes a hacker to catch a hacker.” In order to this you must learn all the techniques, the technology and the mind set of a hacker.

Need to track your employees or children computer activities at all times? Ever had need to keep tabs on your spouse while they use your computer? Are you law enforcement and need to create spyware to track a suspects illegal activities.

NCSU will teach you how to install, configure and deploy powerful computer spy software that allows you to monitor EVERYTHING users do on your computer – in total stealth.

This course is broken down into 2 main sections:

Section 1 – You will create spyware, viruses or malware using the 4 of the most popular open source viruses makers. These are real viruses and malware, not demos.

You will learn:

  • Learn how to make a virus
  • Learn how to make malware
  • Learn how to install malware on a cell phones
  • Learn what the features of some viruses are
  • Learn how to hide a virus once executed
  • How to configure the software to run without being detected
  • Learn how to automatically log everything a user does
  • Learn how to make the program automatically start when the computer is turned on
  • Learn how to have all monitored activity sent to you via email

Section 2 – You will learn to use the 4 mst popular anti-spyware/virus/malware programs to see if the viruses you created can be detected or undetected.

  • Download the top 5 anti-spyware/virus/malware programs
  • Install each program to see if it can detect the spyware/virus/malware you just created

You will learn:

  • How to configure the software to run without being detected
  • Learn how to automatically log everything a user does
  • Learn how to make the program automatically start when the computer is turned on
  • Learn how to have all monitored activity sent to you via email
  • Learn what all the software monitors

This course comes with all software shown in this course:

  • Includes software used and demonstrated in the training
  • No certificate given

Course Curriculum

Getting Started….
Course Discussion
The Top 30 Most Dangerous Viruses Of All Time…
Computer Security Dictionary
The Different Between A Virus, Worm and Malware
What Is Malware – Types, Prevention & Treatment – Part 1
What Is Malware – Types, Prevention & Treatment – Part 2
Phishing Scams and Social Engineering
Understanding Viruses And How Anti-Viruses Work
How to Make a Virus
Virus Making Video
DarkHorse Virus Maker for Windows
DeadLine’s Virus Maker for Windows
Poison Virus Maker for Windows
SonicBat Virus Maker for Windows
How To Perform A Phishing Attack
How to Make a Worm
Ghost Eye Worm Video
Ghost Eye Worm Program Files for Windows
Internet Worm Maker Thing Video
Internet Worm Maker Thing Program for Windows
How to Deploy Malware
Spyware
Spyware Installation and Features Video
Spytech SpyAgent Program Demo for Windows
Lan Turtle – Stealth Remote Access, Network intelligence Gathering
Lan Turtle – Stealth Remote Access
Anti-Spyware Experiment
12:21
How To Detect Malware
Malware Analysis
What Should You Look For
What Are The Best Type Of Malware Software To Use

Source:http://www.nationalcybersecurityuniversity.net/courses/making-viruses-and-spyware-101

. . . . . . . .

Leave a Reply