
Key Logger Spyware Design
Spyware Design Using C++ Language
What you'll learn
- Understand the basics of C++
- Design spyware from scratch
- Manage textual data effectively
- Protect systems from spyware
- Use advanced programming tools
- Analyze spyware results
About this course
The Key Logger spyware program is a tool used to record every keystroke typed on a keyboard, exploited by both professional and novice hackers to collect sensitive data such as passwords and personal information. This data is saved in a text file and sent to the attacker via email. This course aims to teach you how to create a Key Logger program using C++, with a comprehensive and detailed explanation of the language's fundamentals, making it suitable even for beginners with no prior programming experience. The course also focuses on how to protect yourself from falling victim to these attacks by understanding how these programs work and prevention strategies. The course starts from scratch and helps you build strong skills in programming and cybersecurity, enabling you to understand and effectively deal with digital threats.
Expected outcomes
- Ability to design an effective Key Logger spyware program.
- Acquire skills in managing and processing text data.
- Familiarity with system protection mechanisms against spyware.
- Develop practical experience in programming with C++.
Course content
1Basic Concepts of Programming
1 lectures
2Programming Basics in C++
6 lectures
- Installing the Integrated Development Environment Code Blocks8:11
- Creating the First Project in C Language36:13
- Code Writing Rules and How to Comment8:52
- Variables and Data Types40:25
- Constants and Data Types10:14
- Scope of Variable Definition: Public and Private10:21
3Basic Input and Output Process
2 lectures
- Basic Output Operation15:51
- Basic Input Operation4:42
4Types of Transactions and Arithmetic Operations
9 lectures
- Assignment Operator Equals7:41
- Arithmetic Operators11:37
- Precedence of Arithmetic Operations10:48
- Compound Mathematical Operators5:59
- Arithmetic Increase and Decrease Operators6:50
- Simple Practical Application4:13
- Mathematical Comparison Operators11:02
- Logical Operators17:31
- Bitwise Logical Operations15:13
5Conditional Control Statements
3 lectures
- IF Conditional Statement39:52
- Nested Conditional Statements16:18
- Switch Case30:43
6Loops
4 lectures
- Introduction to How Loops Work21:24
- Looping with While28:07
- Practical Application32:19
- Looping with For1:01:18
7Functions and Procedures
1 lectures
- Functions and Procedures40:26
8Pointer and Array
2 lectures
- Explaining the Concept of Pointer20:13
- Explaining the Concept of Array48:26
9Writing and Reading Text Files
3 lectures
- Explaining the Concept of Structure21:11
- Writing Text Files to Hard Disk41:05
- Reading Text Files from Hard Disk31:14
10Creating a Keylogger Program
2 lectures
- Beginning Programming a Spy Program39:30
- Handling Uppercase and Lowercase Letters31:04
11Spy Keys
3 lectures
- Special Keys Using Shift28:06
- Space – Backspace - Escape Keys21:52
- Number Keys on the Right17:37
12Final Configuration
1 lectures
- Hiding the Keylogger11:48
13Sending the Keylogger to the Victim
1 lectures
- Automatically Running Keylogger on Windows18:58
14Automatically Obtain and Receive Victim Data via Email
3 lectures
- Getting Victim Data (Part One)26:33
- Getting Victim Data (Part Two)1:03:00
- Getting Victim Data (Part Three)27:35
15Protection
1 lectures
- Protect Yourself from Keylogger Files15:03
16Add-ons
2 attachments
- Download the Explained Codes from the Course Here
- Programs and Tools Used
Instructor

Eng. Mohamed Ali Mansour





