MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 25 lectures (4h 19m) | Size: 1.49 GB
How to Protect Your Self and Your Network by Creating a Real Ransomware in Java
What you'll learn:Understanding differences between various categories of malware in real-world hacking such as ransomware, trojan, and keylogger in ethical hacking
Learning cryptography basics in a simple language for ransomware design
Learning essential Java basics for writing a real ransomware in Java
Creating a basic cross-platform Ransomware Program that works on Windows, Linux, and macOS.
How to detect victim host operating system and finding worthwhile files for the encryption
How to detect a ransomware in your system
How to perform reverse engineering on a ransomware file
How to find keys without contacting the attackers
How to recover your encrypted files with reverse engineering on the ransomware file
RequirementsYou should have a basic understanding of operating systems and networking. Note that you do not need to be an experienced Java programmer, all the basics are included in this workshop, and you will learn all the basics in the course.
Description* Course Description
In this course, you will learn how to create real-world Ransomware from scratch in Java. Thus, at the end of this course, we have cross-platform (running on Windows, Linux, and Mac OS) Ransomware, which helps you better understand a hacker mind, and protect yourself, your network, and your company in a practical way. This course's primary motivation is to share the necessary knowledge and experience about Ransomware design by an experienced Ph.D. in Cyber Security. We hope our course simply helps you understand how real-world ransomware functionalities and details (by learning how to create one of them from scratch). Needless to say, by taking this course, you equip yourself with concrete skills to become a world-class malware analyst and gain high-paid jobs.
Furthermore, we presumed the attendees have no background in malware writing. Hence, we explained all crucial points concretely and easily with multiple figures in simple language. For instance, you will learn necessary points about different cryptographic algorithms (e.g., Symmetric-key algorithm, Public-key cryptography, and hashes) as well as essential topics in Java programming such as hello-world program structures, OOP, strings, cryptographic APIs, file encryption and decryption, Java Virtual Machine bytecode, and Swing APIs. Finally, all videos are organized in chronological order so that a potential student can learn all necessary points from scratch step-by-step, along with private articles, and exercises, and source codes. This course comprises the following chapters:
* Prerequisite:
VirtualBox. You will be asked to download and run a Windows 10 VM with IDA free, Ghidra, dotPeek, x86dbg, a hexadecimal editor, and miasm.
* Who is it for?
Computer Science Students, IT and cybersecurity specialists, developers, QA experts, system administrators, and novice bug hunters.
* Benefits of Buying this course
Unlimited access to all contents including solutions
Unlimited access to the non-public papers, source codes, and extra exercises
Having direct chat with the teacher for getting technical advice, solving exercises, and sharing technical issues
* Bonus:
Those folks who buy this course will be able to access the videos, articles, and source codes. Moreover, the buyers chat with the teacher directly and ask their technical questions unlimitedly.
* Attention:
This course is provided for educational purposes only, so HackerBurg and the teacher do not take any responsibility for the misuse of the content, resources, and knowledge provided by the course!
Who this course is forThis course is for students, beginners, IT pros, software programmers, and Cyber Security experts looking to get certified and land an entry-level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply, which means more opportunity, job security, and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction