Key Logger Spyware Design

Spyware Design Using C++ Language

0h 0m44 lectures16 sections

What you'll learn

  • Understand the basics of C++
  • Design spyware from scratch
  • Manage textual data effectively
  • Protect systems from spyware
  • Use advanced programming tools
  • Analyze spyware results

About this course

The Key Logger spyware program is a tool used to record every keystroke typed on a keyboard, exploited by both professional and novice hackers to collect sensitive data such as passwords and personal information. This data is saved in a text file and sent to the attacker via email. This course aims to teach you how to create a Key Logger program using C++, with a comprehensive and detailed explanation of the language's fundamentals, making it suitable even for beginners with no prior programming experience. The course also focuses on how to protect yourself from falling victim to these attacks by understanding how these programs work and prevention strategies. The course starts from scratch and helps you build strong skills in programming and cybersecurity, enabling you to understand and effectively deal with digital threats.

Expected outcomes

  • Ability to design an effective Key Logger spyware program.
  • Acquire skills in managing and processing text data.
  • Familiarity with system protection mechanisms against spyware.
  • Develop practical experience in programming with C++.

Course content

1

Basic Concepts of Programming

1 lectures
  1. Basic Concepts of Programming19:24
2

Programming Basics in C++

6 lectures
  1. Installing the Integrated Development Environment Code Blocks8:11
  2. Creating the First Project in C Language36:13
  3. Code Writing Rules and How to Comment8:52
  4. Variables and Data Types40:25
  5. Constants and Data Types10:14
  6. Scope of Variable Definition: Public and Private10:21
3

Basic Input and Output Process

2 lectures
  1. Basic Output Operation15:51
  2. Basic Input Operation4:42
4

Types of Transactions and Arithmetic Operations

9 lectures
  1. Assignment Operator Equals7:41
  2. Arithmetic Operators11:37
  3. Precedence of Arithmetic Operations10:48
  4. Compound Mathematical Operators5:59
  5. Arithmetic Increase and Decrease Operators6:50
  6. Simple Practical Application4:13
  7. Mathematical Comparison Operators11:02
  8. Logical Operators17:31
  9. Bitwise Logical Operations15:13
5

Conditional Control Statements

3 lectures
  1. IF Conditional Statement39:52
  2. Nested Conditional Statements16:18
  3. Switch Case30:43
6

Loops

4 lectures
  1. Introduction to How Loops Work21:24
  2. Looping with While28:07
  3. Practical Application32:19
  4. Looping with For1:01:18
7

Functions and Procedures

1 lectures
  1. Functions and Procedures40:26
8

Pointer and Array

2 lectures
  1. Explaining the Concept of Pointer20:13
  2. Explaining the Concept of Array48:26
9

Writing and Reading Text Files

3 lectures
  1. Explaining the Concept of Structure21:11
  2. Writing Text Files to Hard Disk41:05
  3. Reading Text Files from Hard Disk31:14
10

Creating a Keylogger Program

2 lectures
  1. Beginning Programming a Spy Program39:30
  2. Handling Uppercase and Lowercase Letters31:04
11

Spy Keys

3 lectures
  1. Special Keys Using Shift28:06
  2. Space – Backspace - Escape Keys21:52
  3. Number Keys on the Right17:37
12

Final Configuration

1 lectures
  1. Hiding the Keylogger11:48
13

Sending the Keylogger to the Victim

1 lectures
  1. Automatically Running Keylogger on Windows18:58
14

Automatically Obtain and Receive Victim Data via Email

3 lectures
  1. Getting Victim Data (Part One)26:33
  2. Getting Victim Data (Part Two)1:03:00
  3. Getting Victim Data (Part Three)27:35
15

Protection

1 lectures
  1. Protect Yourself from Keylogger Files15:03
16

Add-ons

2 attachments
  1. Download the Explained Codes from the Course Here
  2. Programs and Tools Used

Instructor

Eng. Mohamed Ali Mansour

Eng. Mohamed Ali Mansour

Network and System Administrator Expert with experience in troubleshooting, installation, configuration, and maintenance of various network devices and Windows servers.
5,228 students1 courses

Related courses

  • Microsoft Access
    4.6|5,337|0h 0m

    Microsoft Access

    Learn to Create Databases and Reports

    Ahmed Hassan Khamis
    Ahmed Hassan Khamis
    $19.99
    Buy now
  • Adobe Animate & Action Script
    4.7|6,962|16h 58m

    Adobe Animate & Action Script

    Learn to Create Cartoon Films and Interactive Games

    Ahmed Hassan Khamis
    Ahmed Hassan Khamis
    $19.99
    Buy now
  • Deep Learning
    4.5|5,162|12h 40m

    Deep Learning

    Simulating the Human Mind in Thinking

    Eng. Amr Abdel Fattah
    Eng. Amr Abdel Fattah
    $25.99
    Buy now
  • Machine Learning
    4.6|5,196|9h 54m

    Machine Learning

    Making Predictions Based on Data Analysis

    Eng. Amr Abdel Fattah
    Eng. Amr Abdel Fattah
    $25.99
    Buy now