As an ethical hacker, there are times when you need to hide software from the company that you are performing the test against in order to verify that the defensive strategy isn't able to find your software. Trojans and Backdoors is the course where our software is going to be going undercover. In this course we are going to define malware and take a look at how a payload is delivered. We will overview the various Trojan tools, and tools used to generate Trojan programs, as well as, learning about Netcat. We will spend time going over countermeasures and various anti-Trojan software and hardware, and preventive methods that can be used to prevent attacks. We will also be incorporating several demos on the many tools that we will be discussing in this course.