Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Antivirus Evasion - Hard Core

Rekomendowane odpowiedzi

56f12946b2462952a5906784ac76a97c.jpeg
Free Download Udemy - Antivirus Evasion - Hard Core
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.02 GB | Duration: 1h 56m
Learn Hands-On In Cyber-Security How Red Teamers and Threat Actors (APT) Evade Security Mechanisms in the Real World

What you'll learn
Crafting Undetectable Payloads that Bypasses A fully UpTo date Windows Defender Antivirus using Metasploit Shellcode, C# Codes e.t.c
Installing Kali Linux & Windows Virtual Machines
Cyber Security
Ethical Hacking
Requirements
A computer with 8GB ram to support 2 VMs running at the same time
Basic understanding of operating systems
Strong will to learn & creative mindset
If you like Hands-On, well this is the course for you, we do Hands-On here
Description
In today's rapidly evolving threat landscape, malware developers constantly create sophisticated techniques to evade antivirus and endpoint detection solutions. This advanced cybersecurity course focuses on equipping learners with the skills and knowledge necessary to understand and implement evasion tactics, which are crucial for penetration testers, red team members, and cybersecurity professionals tasked with simulating advanced threats.Throughout the course, students will explore the inner workings of antivirus software and how malware is typically detected and blocked. By understanding these mechanisms, learners will dive into the techniques used to bypass detection, such as code obfuscation, encryption, packers, and polymorphism. Real-world case studies and hands-on labs will allow students to practice evasion techniques in a controlled environment, ensuring they develop the skills needed to simulate advanced persistent threats (APTs) and stealthy malware.Key topics include:- Overview of antivirus detection mechanisms (signature-based, behavior-based, heuristic analysis)- Bypassing static and dynamic analysis- Code obfuscation and encryption techniques- Using packers and crypters to evade detection- Polymorphic and metamorphic malware- Advanced persistence techniques and rootkitsBy the end of the course, learners will have a comprehensive understanding of how antivirus solutions operate and the techniques malicious actors use to avoid detection. This knowledge will empower cybersecurity professionals to think like adversaries, strengthening their ability to defend against modern cyber threats through improved detection and response strategies. Ideal for those with a solid foundation in cybersecurity, this course emphasizes ethical use of these techniques to bolster organizational security.
Overview
Section 1: Course Prelude
Lecture 1 Introduction
Section 2: Lab Setup & Configuration
Lecture 2 Welcome
Lecture 3 Installing VMware Pro
Lecture 4 Downloading Kali & Windows 11 VM
Lecture 5 Setting Up Machines On VMware
Lecture 6 Getting Kali The Evader Ready
Lecture 7 Getting Windows 11 VM Ready
Lecture 8 Installing Visual Studio
Section 3: AV Evasion
Lecture 9 Installing Sublime & Updating Windows 11
Lecture 10 Powershell Payloads Evading - Mama Don't Play Technique #1
Lecture 11 Powershell Payloads Evading - You Saw Nothing Technique #2
Lecture 12 Powershell Payloads Evading - Bomb In The Mouth Technique #3
Lecture 13 Crafting a Unique Fabricated Shellcode Runner Payload
Lecture 14 Obfuscating Shellcode Runner Payload to Evade Detection
Section 4: Wrap Up
Lecture 15 Wrap Up
Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild
Homepage

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.




Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 15 Views
    • 1 Posts
    • 15 Views
    • 1 Posts
    • 16 Views
    • 1 Posts
    • 14 Views
    • 1 Posts
    • 22 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.