![[Eduwill White Hacker] Network Analysis강의 썸네일](https://cdn.inflearn.com/public/courses/329693/cover/4a4b65e9-9621-4884-815b-efbdd604c685/329693-eng-original.png?w=420)
[Eduwill White Hacker] Network Analysis
eduwill
Learn the skills to analyze vulnerabilities and defend against hacking through network analysis!
중급이상
Wireshark
Let's create malware such as ransomware and Trojan horses ourselves, and learn how to bypass antivirus software!
How to bypass vaccines
Malware principles through malware production techniques (Trojan horses, ransomware, etc.)
Eduwill's white hat hacker training course!
Introducing the subjects of the 'White Hacker' course :)
Malicious code (Malware) is a general term for any code that is not designed for "normal" functions, but rather for "malicious" purposes that harm users. The Information and Communications Network Act defines it as a "malicious program." Its implementation methods include computer viruses, Trojan horses, and worms, and it is sometimes given a separate name based on its actual behavior.
These days, unlike in the past, malware distribution increasingly utilizes multiple means to evade security procedures, and the reason for malware distribution is increasingly shifting toward the realistic(?) goal of "making money." Therefore, it is difficult to classify malware by just the three major implementation methods used in the past. Furthermore, very unique cases, such as ransomware, have emerged, so the distinction based on implementation method is almost disappearing these days. Even security experts often use the terms interchangeably, or even misuse them.
In fact, it's safe to say that Korea is the only country that truly calls malware by its proper name, having established the term "malware" as a government policy from the outset. This has led to criticism in the security industry for its use of vulgar terms. There are even instances of governments developing malware for cyberwarfare purposes, targeting key institutions and facilities in opposing countries.
Let's learn the principles of malware creation, antivirus software configuration, and how to bypass them :)
📢 Please check the precautions!
Q. Can non-majors follow along?
Yes, of course you can. However, there are some prerequisite knowledge required for learning, so be sure to check the [Prerequisite Knowledge] section below!
Who is this course right for?
For those who want to know what malware is
For those who want to know what a vaccine is
Need to know before starting?
Linux
All
10 lectures ∙ (7hr 53min)
All
3 reviews
$68.20
Check out other courses by the instructor!
Explore other courses in the same field!