Python Hacking for Cyber Security: From A-Z Complete Course

Become a Python Hacker. Hack computer systems and crack passwords. Secure Systems and use Penetration testing as a Cyber Security Expert.

Beginner 0(0 Ratings) 120 Students enrolled
Created by Python Word Last updated Wed, 03-Jun-2020 English
What will i learn?
  • Learn all about Port and Vulnerability Scanning.
  • Secure your system against SSH & FTP Attacks.
  • Learn Password Cracking up to date methods.
  • Understand Network Analysis in Python Hacking.
  • Attacking Multiple targets And Gathering Botnet.
  • Website Penetration Testing With Python

Curriculum for this course
89 Lessons 17:26:01 Hours
Introduction
5 Lessons 01:02:50 Hours
  • Welcome to Python For Ethical Hacking! 00:05:17
  • VirtualBox 6.0.4 Installation 00:11:42
  • Kali Linux 2019.1a Installation 00:17:08
  • Guest Additions Installation 00:15:09
  • Python In Kali Terminal 00:13:34
  • Making Simple Portscanner 00:15:34
  • Adding Raw input To Our Portscanner 00:09:25
  • Scanning First 1000 Ports 00:04:48
  • Coding Advance Portscanner Part 1 00:13:14
  • Coding Advance Portscanner Part 2 00:08:52
  • Finishing And Testing Advance Portscanner 00:09:01
  • Configuring IP Address And Installing Metasploitable 00:08:15
  • Returning Banner From Open Port 00:14:47
  • Coding Vulnerability Scanner Part 1 00:11:58
  • Coding Vulnerability Scanner Part 2 00:07:22
  • Automating SSH Login Part 1 00:09:56
  • Automating SSH Login Part 2 00:09:22
  • Testing SSH Login Program 00:08:38
  • Coding SSH Bruteforcer 00:10:39
  • Executing Command On Target After Bruteforcing SSH 00:10:12
  • Anonymus FTP Login Attack 00:09:56
  • Username & Passwordlist Attack on FTP 00:17:33
  • SHA256, SHA512, MD5 00:08:38
  • Cracking SHA1 Hash With Online Dictionary 00:16:42
  • Getting Password From MD5 Hash 00:13:27
  • Cracking Crypt Password With Salt 00:24:04
  • Chaning MAC Address Manualy 00:08:36
  • Coding MAC Changer 00:17:01
  • Theory Behind ARP Spoofing 00:04:44
  • Crafting Malicious ARP Packet 00:19:29
  • Coding ARP Spoofer 00:13:34
  • Forwarding Packets And Restoring ARP Tables 00:08:08
  • Spoofing Our IP Address And Sending Message With TCP Payload 00:12:03
  • Running SynFlooder With Changed Source IP Address 00:11:23
  • Getting Source And Destination MAC Address From Receive 00:24:47
  • Sniffing FTP Username And Password Part 1 00:08:13
  • Sniffing FTP Username And Password Part 2 00:12:13
  • Getting Passwords From HTTP Websites 00:14:05
  • Cloning Any Webpage 00:10:38
  • Printing DNS Queries 00:10:02
  • Redirecting Response To Cloned Page 00:16:49
  • Setting IP Table Rules and Running DnsSpoofer 00:10:41
  • Analyzing Ethernet Header 00:16:11
  • Analyzing IP Header Part 1 00:10:28
  • Analyzing IP Header Part 2 00:25:36
  • Analyzing TCP Header 00:15:16
  • Analyzing UDP Header 00:13:22
  • Theory Behind Socket Programming 00:07:21
  • Wine & Pyinstaller Installation 00:07:46
  • Setting Up Listener 00:08:20
  • Establishing Connection Between Target and Server 00:06:33
  • Implementing Send & Recieve Functions 00:11:31
  • Executing Commands on Target System 00:11:45
  • Importing JSON Library To Parse Data 00:08:22
  • Converting Python Backdoor To exe 00:08:16
  • Using OS Library To Change DIrectory 00:10:01
  • Downloading & Uploading Files To Target PC 00:19:08
  • Hiding Our Backdoor And Creating Persistence 00:13:51
  • Trying to Connect To Server Every 20 Seconds 00:07:56
  • Downloading Files To Target PC 00:11:52
  • Capturing Screenshot On Target PC 00:23:09
  • Administrator Privilege Check 00:08:16
  • Starting Other Programs WIth Our Shell 00:10:48
  • Running Our Shell As An Image, Audio, Pdf 00:20:10
  • Installing Pynput 00:06:22
  • Printing Space Character 00:08:51
  • Calling Timer On Our Keylogger 00:09:59
  • Adding Keylogger To Our Backdoor 00:13:01
  • What Is A Threaded Server 00:05:08
  • Accepting Connections With A Thread 00:13:15
  • Managing Multiple Sessions 00:08:42
  • Testing Threaded Server With Windows 10 Target 00:09:06
  • Fixing Q Command 00:11:15
  • Coding Exit Function 00:13:54
  • Attacking Multiple targets And Gathering Botnet 00:16:30
  • Stealing Saved Wireless Passwords 00:22:01
  • Saving Passwords To a File 00:03:04
  • Bruteforcing Gmail 00:10:16
  • Bruteforcing Any Login Page Part 1 00:13:02
  • Bruteforcing Any Login Page Part 2 00:10:12
  • Finding Hidden Directories Part 1 00:05:13
  • Finding Hidden Directories Part 2 00:06:41
  • Discovering Subdomains 00:11:34
  • Changing HTTP Headers 00:14:01
  • Starting Basic And Digest Authentication Brutefo 00:10:26
  • Controlling Threads 00:08:38
  • Coding Run Function 00:10:11
  • Printing Usage And Testing Our Program 00:12:39
  • Taking A Look At Ransomware 00:08:23
Requirements
  • There is no previous programming knowledge required.
  • All Basics covered in the course, from installation to coding your first line.
+ View more
Description

Learn Ethical Hacking, Cyber Security and Kali Linux Today.

Would you like to learn how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools? This knowledge is very useful for you to advance your ethical hacking career?

This is a very valuable job skill that you can work on, and you can get a full-time job in this almost anywhere in the world. You can see people earning a fortune and earning great hourly rates all over the world to do ethical hacking.

You can see anywhere from $35 an hour at the very lowest as a security consultant to over $250 an hour to be an ethical hacker that is certified and experienced with a consistent job success.

In this course you will learn:

- Python for ethical hacking!

- Port and vulnerability scanning

- SSH & FTP attacks

- Password cracking

- Sniffers, flooders, and spoofers

- Coding DNS spoofer

- Network analysis

and more…

You'll be getting:

✔ Lifetime Access to over 80 Lectures

Step by Step Practice

Up to date Online Training

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it! Enroll to become a Python Hacking expert today.

Who is the target audience?

- Employees who want to expand their Cyber Security skills.

- Anyone looking to develop skills for Python Hacking.

- Anyone who wants to Improve their resume with programming courses.

+ View more
Other related courses
03:35:23 Hours
0 121 $350 $7
14:14:43 Hours
0 121 $350 $7
17:39:38 Hours
0 6 $350 $7
About the instructor
  • 0 Reviews
  • 124 Students
  • 3 Courses
+ View more

Hello, I'm Python. Here you'll find courses all about programming. The main topics i discuss are Python3, Ethical Hacking and Google GoLang. My courses are simple and straight forward. You'll find that my courses are cut into parts to meet the SkillShare meta, however they are organised and put into sections. Hopefully you'll enjoy my content and it benefits your programming career.

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$7 $350
Buy now
Includes:
  • 17:26:01 Hours On demand videos
  • 89 Lessons
  • Full lifetime access
  • Access on mobile and tv