Inflearn brand logo image
Inflearn brand logo image
Inflearn brand logo image
Security & Network

/

Computer Security

[Eduwill White Hacker Training Course] Malware Creation

Let's create malware such as ransomware and Trojan horses ourselves, and learn how to bypass antivirus software!

(5.0) 3 reviews

74 learners

  • eduwill
해킹
모의해킹
악성코드
보안
Malware

What you will learn!

  • How to bypass vaccines

  • Malware principles through malware production techniques (Trojan horses, ransomware, etc.)

Eduwill's white hat hacker training course!

hello!
This is Eduwill's learning assistant .

Introducing the subjects of the 'White Hacker' course :)

✅ Malware creation

Malicious code (Malware) is a general term for any code that is not designed for "normal" functions, but rather for "malicious" purposes that harm users. The Information and Communications Network Act defines it as a "malicious program." Its implementation methods include computer viruses, Trojan horses, and worms, and it is sometimes given a separate name based on its actual behavior.

These days, unlike in the past, malware distribution increasingly utilizes multiple means to evade security procedures, and the reason for malware distribution is increasingly shifting toward the realistic(?) goal of "making money." Therefore, it is difficult to classify malware by just the three major implementation methods used in the past. Furthermore, very unique cases, such as ransomware, have emerged, so the distinction based on implementation method is almost disappearing these days. Even security experts often use the terms interchangeably, or even misuse them.

In fact, it's safe to say that Korea is the only country that truly calls malware by its proper name, having established the term "malware" as a government policy from the outset. This has led to criticism in the security industry for its use of vulgar terms. There are even instances of governments developing malware for cyberwarfare purposes, targeting key institutions and facilities in opposing countries.

Let's learn the principles of malware creation, antivirus software configuration, and how to bypass them :)

📢 Please check the precautions!

  • After learning this course, you can hack an actual service in service. It is a criminal act .
  • Any person who violates Article 48 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. by intruding into or causing a disruption to an information and communications network shall be punished by imprisonment for not more than 5 years or a fine not exceeding 50 million won in accordance with Article 71 (Penalties) of the same Act.
  • Eduwill informs that it is not liable for any legal consequences if you study the course and maliciously infringe on the information of others or use it for actual cybercrime.

network theory
Explore the curriculum 📚

Q&A for Prospective Students 💬

Q. Can non-majors follow along?

Yes, of course you can. However, there are some prerequisite knowledge required for learning, so be sure to check the [Prerequisite Knowledge] section below!

Instructor Introduction 👨‍🏫


Learn IT with Eduwill! 🎓

Recommended for
these people

Who is this course right for?

  • For those who want to know what malware is

  • For those who want to know what a vaccine is

Need to know before starting?

  • Linux

Hello
This is

720

Learners

51

Reviews

6

Answers

4.4

Rating

14

Courses

Curriculum

All

10 lectures ∙ (7hr 53min)

Published: 
Last updated: 

Reviews

All

3 reviews

5.0

3 reviews

  • cty35870708님의 프로필 이미지
    cty35870708

    Reviews 10

    Average Rating 5.0

    5

    30% enrolled

    • kyongminmin4823님의 프로필 이미지
      kyongminmin4823

      Reviews 1

      Average Rating 5.0

      5

      60% enrolled

      Thank you so much for the very informative lecture.

      $68.20

      eduwill's other courses

      Check out other courses by the instructor!