Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

Courses2024

Udemy - Bash Scripting for Cybersecurity by John Ebinyi Odey

Rekomendowane odpowiedzi

94184ec9c48c6f654d26acbec9aac310.webp
Free Download Udemy - Bash Scripting for Cybersecurity by John Ebinyi Odey
Published: 4/2025
Created by: John Ebinyi Odey
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English | Duration: 15 Lectures ( 3h 34m ) | Size: 1.51 GB

Ransomware Development
What you'll learn
How Ransomware Works - Understand the fundamentals of ransomware, including how it encrypts files, spreads, and demands payment.
Bash Scripting for Cybersecurity - Learn how to use Bash to automate tasks, encrypt files, and create scripts used in ethical hacking.
Building a Simulated Ransomware Program - Gain hands-on experience writing a basic and advanced Bash-based ransomware script in a controlled lab environment.
Reverse Shell - Learn how to carry out a reverse shell
Requirements
Basic Linux Knowledge - Students should have a fundamental understanding of Linux commands and navigation.
Familiarity with Bash Scripting - Some prior exposure to Bash scripting is helpful, but beginners can follow along.
A Computer with Virtualization Support - A system capable of running VirtualBox or VMware for a safe testing environment.
Interest in Cybersecurity & Ethical Hacking - No prior hacking experience is required, but a passion for learning security concepts is beneficial.
Basic Understanding of Cryptography - Familiarity with encryption and decryption concepts (AES, RSA, etc.) will be useful.
Networking Fundamentals - Knowledge of IP addresses, SSH, and basic networking concepts will help in understanding attack vectors.
Legal & Ethical Mindset - Students must understand that the course is strictly for educational and ethical hacking purposes.
Description
Are you ready to take your cybersecurity skills to the next level? In this course, Bash Scripting for Cybersecurity: Ransomware Development, you will gain hands-on experience in understanding and building a basic and an advanced ransomware script using Bash.What you will learn:Fundamentals of Bash scripting and automation Encryption and how they apply to ransomware How ransomware operates and spreads Cryptography by encrypting and decrypting filesCarrying out a basic Social Engineering attackEstablishing a bind shell and a reverse shellCreating a key-based (passwordless) authentication using SSHUsing SSH and SCP to perform file copy (steal victim files) from target machine to attacker's machine and vice-versaBoth the basic and advanced Bash Ransomware you will learn how to build in this course, will have the following features.Basic Bash Ransomware Feature:Encryption of files in the target directory Removal of the original files (plaintext files) from the target directoryAdvanced Bash Ransomware Feature:Encryption of files in the target directory.The ransomware will be able to encrypt itself, shreds and remove or delete its original self.This course is designed for cybersecurity professionals, ethical hackers, and penetration testers who want to deepen their knowledge of malware behavior and scripting techniques.Important Disclaimer: This course is strictly for educational purposes only. Creating or deploying malicious software for illegal use is a crime. The purpose of this course is to educate cybersecurity professionals on how to defend against such attacks.Enroll now and start mastering Bash scripting for cybersecurity today!
Who this course is for
Linux Users & Developers - Individuals with basic Linux knowledge who want to deepen their understanding of Bash scripting and encryption techniques.
Students & Cybersecurity Learners - Beginners and advanced learners interested in cybersecurity, ethical hacking, and hands-on malware simulation in a safe lab environment.
Penetration Testers & Security Researchers - Professionals who want to enhance their skills in scripting, and security testing using Bash.
Cybersecurity Enthusiasts & Ethical Hackers - Anyone looking to understand how ransomware works, how to simulate attacks ethically, and how to defend against them.
Red Team Members - Ethical hackers who perform adversary simulations and need to understand how attackers leverage scripting techniques to evade detection.
Anyone Interested in Malware Development & Security Research - If you have a passion for cybersecurity and want to learn how cyber threats operate or how to build a malware, this course is for you!
Homepage:

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.




Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 3 Views
    • 1 Posts
    • 2 Views
    • 1 Posts
    • 2 Views
    • 1 Posts
    • 4 Views
    • 1 Posts
    • 3 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.