Self-Extracting Executables for Hackers
Offered By: John Hammond via YouTube
Course Description
Overview
Explore the world of self-extracting executables in this 41-minute cybersecurity video. Dive into the techniques and tools used by hackers to create and deploy self-extracting executables. Learn about the potential security risks associated with these files and how they can be used for malicious purposes. Gain insights into the inner workings of self-extracting executables and understand their role in cybercrime and hacking operations. Discover methods to detect and analyze these types of files to enhance your cybersecurity knowledge and defensive capabilities. Whether you're a security professional or an enthusiast looking to expand your understanding of hacker tradecraft, this video provides valuable information on a crucial aspect of modern cyber threats.
Syllabus
Self-Extracting Executables for Hackers
Taught by
John Hammond
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam