3. Weaponization
This module will look at weaponization, or how hacking exploits can be created and disguised. The software simulations will cover the creation of mobile and desktop payloads.
- Weaponization
- Obfuscation
- Encryption
- Ciphers
- Desktop Malware
- Mobile Malware
- Windows App Malware Creation
- Mobile Malware Creation
Please note: this content was produced in the UK and may include the use of British English.
Intended Audience
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
Prerequisites of the Certifications
There are no prerequisites for this lesson, however, participants are expected to have a basic understanding of computers and the internet.
Feedback
We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.