3. Weaponization

Difficulty: Beginner
Duration: 15 minutes and 14 seconds
Students: 1,115
Rating: 4.4/5

This module will look at weaponization, or how hacking exploits can be created and disguised. The software simulations will cover the creation of mobile and desktop payloads.  

  • Weaponization 
  • Obfuscation 
  • Encryption 
  • Ciphers 
  • Desktop Malware 
  • Mobile Malware  
  • Windows App Malware Creation  
  • Mobile Malware Creation  

Please note: this content was produced in the UK and may include the use of British English. 

Intended Audience  

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  

 

Prerequisites of the Certifications 

There are no prerequisites for this lesson, however, participants are expected to have a basic understanding of computers and the internet. 

 

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think. 

QA
This content is developed in partnership with QA
Learn more