YoVDO

Self-Extracting Executables for Hackers

Offered By: John Hammond via YouTube

Tags

Malware Courses Cybersecurity Courses Reverse Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of self-extracting executables in this 41-minute cybersecurity video. Dive into the techniques and tools used by hackers to create and deploy self-extracting executables. Learn about the potential security risks associated with these files and how they can be used for malicious purposes. Gain insights into the inner workings of self-extracting executables and understand their role in cybercrime and hacking operations. Discover methods to detect and analyze these types of files to enhance your cybersecurity knowledge and defensive capabilities. Whether you're a security professional or an enthusiast looking to expand your understanding of hacker tradecraft, this video provides valuable information on a crucial aspect of modern cyber threats.

Syllabus

Self-Extracting Executables for Hackers


Taught by

John Hammond

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam