Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python for Cybersecurity
Welcome
A Note From Your Instructor (2:11)
Introduction to Python for Cybersecurity
Section Introduction (0:45)
Programming Primer (3:18)
Python programming language overview (2:59)
Setting Up VirtualBox and Kali Linux (7:44)
Installing VS Code (10:51)
Setting up Python on Kali Linux (13:27)
Setting up Python on Windows (2:26)
UPDATE: Installing Python, Homebrew, Conda, and VS Code on MacOS (4:22)
Python Basics for Cybersecurity
Section Introduction (0:49)
Variables and Data Types (13:25)
Basic Operations (10:37)
Introduction to Conditional Statements and Loops (1:15)
Conditional Statements (7:23)
Loops (4:43)
Exercise 1 (4:25)
Exercise 2 (4:36)
Functions (7:03)
File I/O and exception handling (6:47)
Exercise 3 (4:22)
Modules (3:04)
More Uploads Coming
Introduction to classes and objects
Threading
Challenge Lab 1: Basic Python Scripting for Log Analysis
Challenge Lab 2: Creating a Basic Network Scanner
Python and Ethical Hacking
Ethical hacking concepts
Penetration testing tools and techniques
Python for penetration testing
Lab: Automating Reporting Documentation
Network Fundamentals and Python
TCP/IP and OSI model
Python socket programming
Network scanning and sniffing
Lab: Building a simple port scanner
System Security and Python
Operating system security fundamentals
Python's OS and subprocess modules
Malware analysis and reverse engineering
Lab: Building a simple keylogger
Cryptography and Python
Introduction to cryptography
Symmetric and asymmetric encryption
Hash functions and digital signatures
Python cryptography libraries
Password Cracking with Python
Lab: Implementing encryption, decryption, and password cracking with Python
Lab: Build a Password Cracker with Python
Security Automation and Python
Python libraries for automation
Security tools and frameworks
Incident response automation
Lab: Automating cybersecurity tasks using Python
Web Security and Python
HTTP and HTTPS protocols
Web scraping with Python
Analyzing and exploiting web vulnerabilities
Vulnerability assessment and scanning
Lab: Creating a web vulnerability scanner
Lab: Command Injection with Python
Advanced Vulnerability Assessment and Scanning
Introduction to Nmap and its Python library
Network vulnerability scanning with Nmap
Introduction to OpenVAS and interacting with its API
Host vulnerability scanning using OpenVAS
Integrating Nmap and OpenVAS for comprehensive vulnerability assessment
Lab: Developing an advanced vulnerability scanner with Python
Fuzzing and Exploit Development with Python
Introduction to fuzzing
Building a simple fuzzer with Python
Advanced fuzzing techniques
Analyzing Fuzzing Results and Identifying Exploits
Creating a Basic Exploit
Lab: Developing a Simple Fuzzer and Exploit
Advanced Network Analysis with Scapy
Introduction to Scapy
Crafting and analyzing packets with Scapy
Network attacks and defenses using Scapy
Lab: Implementing a network attack and defense with Scapy
Final Project: Building a Cybersecurity Toolkit
Integrating the skills learned throughout the course
Designing and implementing a cybersecurity toolkit
Documentation and presentation
Conclusion and Next Steps
Cybersecurity career paths
Advanced Python and cybersecurity resources
Certifications and further learning
Bonus Section
GPT+Python for Kali Linux
Python and ICS Cybersecurity
Introduction to Scapy
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock