Making Viruses, Malware And Spyware 101

This course will teach anyone how to make viruses, spyware and maleware, then it will teach you how to detect viruses and remove them. | taught by NCSU Team University

Course description


As we have said in several of our courses, "it takes a hacker to catch a hacker." In order to this you must learn all the techniques, the technology and the mind set of a hacker.

Need to track your employees or children computer activities at all times? Ever had need to keep tabs on your spouse while they use your computer? Are you law enforcement and need to create spyware to track a suspects illegal activities.

NCSU will teach you how to install, configure and deploy powerful computer spy software that allows you to monitor EVERYTHING users do on your computer - in total stealth.

This course is broken down into 2 main sections:

Section 1 - You will create spyware, viruses or malware using the 4 of the most popular open source viruses makers. These are real viruses and malware, not demos.

You will learn:

  • Learn how to make a virus
  • Learn how to make malware
  • Learn how to install malware on a cell phones
  • Learn what the features of some viruses are
  • Learn how to hide a virus once executed
  • How to configure the software to run without being detected
  • Learn how to automatically log everything a user does
  • Learn how to make the program automatically start when the computer is turned on
  • Learn how to have all monitored activity sent to you via email

Section 2 - You will learn to use the 4 mst popular anti-spyware/virus/malware programs to see if the viruses you created can be detected or undetected.

  • Download the top 5 anti-spyware/virus/malware programs
  • Install each program to see if it can detect the spyware/virus/malware you just created


This course includes all 4 Virus making software.

viurs-example-1

virus-example-3

virus-example-2

virus-example-4

_______________________________________________________________


You will learn:

  • How to configure the software to run without being detected
  • Learn how to automatically log everything a user does
  • Learn how to make the program automatically start when the computer is turned on
  • Learn how to have all monitored activity sent to you via email
  • Learn what all the software monitors

This course comes with all software shown in this course:

  • Includes software used and demonstrated in the training
  • No certificate given
NCSU Team University
NCSU Team University
National Cyber Security Team

This course is taught by a multiple National Cyber Security Instructors.

instructor.cd@nationalcybersecurity.com

(888) - Teach-U Ext. 701