✅ APT malware creation
APT (Advanced Persistent Threat)
This refers to an attack that involves continuous hacking attempts against individuals, government agencies, or companies to leak personal information or important data.
To put it more simply, hackers set a specific target, approach it with a plan, watch for a certain period of time, and then leak all data when security is vulnerable.
Recently, the number of files that can be infiltrated from outside sources, including through email, USB drives, smartphones, and network data transmission systems, and the number of cases of damage are increasing. We must not overlook the fact that even our country can be compromised by hackers, stealing national infrastructure, personal information, and confidential information using a single USB drive. Furthermore, malware and APT attacks can infect individuals not only by executing executable files infiltrated from outside sources, but also by simply opening documents containing malware. Ransomware is a prime example.
As such, malware and APT attacks are becoming increasingly sophisticated and sophisticated. They are becoming targets not only for individuals, organizations, and businesses, but also for nations, making effective blocking and management crucial. This course will teach you how to create APT malware and how it is used in hacking attacks through hands-on practice.
Knowing how to attack will help you develop the ability to find vulnerabilities and respond/block them!
Q. Can non-majors follow along?
Yes, of course you can. However, there are some prerequisite knowledge required for learning, so be sure to check the [Prerequisite Knowledge] section below!