Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Neuroscience Coaching
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 10.5 hours on-demand video
  • 69 articles
  • 2 downloadable resources
  • 1 coding exercise
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
IT & Software Network & Security Cyber Security

Cyber Security - Python and Web Applications

Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!
Rating: 4.3 out of 54.3 (206 ratings)
1,995 students
Created by Mashrur Hossain, Evgeny Rahman
Last updated 10/2018
English
30-Day Money-Back Guarantee

What you'll learn

  • Start a career in Cyber Security
  • Analyze systems for vulnerabilities and security flaws
  • Build secure web applications
  • Use Python to build tools for security analysis
  • Use Python to build general purpose tools
  • Detect and analyze security threats to web applications
  • Be well versed in the current Cyber Security landscape

Requirements

  • No prior experience with Cyber Security required
  • Basic understanding of how the web works will be useful
  • No prior experience with programming necessary - Python crash course included in the course!

Description

*** Course updated 10/30/2018 (always kept up-to-date) ***

Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist - not just in theory - but in practice.  

Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.  

There is NO platform dependency in this course - You can use any platform you choose - Windows, MacOS and Linux.

No prior experience required with Python or any of the topics covered in this course - There is a Python crash course included!

This course covers the fundamental building blocks of your required skill set - some key items include:

  • Vulnerability Analysis

  • Building and Publishing Security Tools - Dynamic web app security scanner, Password hashing and encrypt tool among many others!

  • Security Scanning

  • Phishing Protection

  • Web Application Vulnerability Mitigation

  • Password Complexity Analysis

  • Antivirus Evasion Remediation

  • Multi-Factor Authentication

  • Network Traffic Analysis

  • Cloud Security

  • Ethical Hacking

  • Web Reconnaissance

  • Wireless Access Point Protection

  • Programming with Python

We also cover the biggest threats in the information technology world today, including:

  • Botnets

  • Code Exploits

  • Sensitive Data Exposure

  • SQL Injection

  • Social Engineering

  • Cross-Site Scripting

  • Port Scanning

  • and many more!

You will get lifetime access to over 100 lectures and 11 hours of video lectures plus corresponding text guides for the lectures! 

This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you'll get your money back, no questions asked!

So what are you waiting for? Learn Cyber Security, Python for Cyber Security and Web Application Security in a way that will advance your career and increase your knowledge, all in a fun and practical way!

Who this course is for:

  • Beginners in the cyber security and/or information technology world
  • Professionals looking to improve their knowledge in using Python for cyber security
  • Beginners in web application security
  • Students curious about security in information technology and its practical applications
  • Cyber security professional switching to Python
  • Student looking to learn Python programming and how it's applied in Cyber Security

Course content

8 sections • 188 lectures • 11h 23m total length

  • Preview03:03
  • Preview01:53
  • Preview10:22
  • Preview01:11
  • Preview07:26
  • Sample Tool 2 - Text Instructions
    00:37
  • Development Environment Overview
    04:33
  • Important course updates (don't skip)
    00:25

  • Preview00:45
  • What is Cyber Security?
    08:01
  • Cyber Security Introduction Quiz
    3 questions
  • Explaining the methodology
    07:12
  • Methodology Quiz
    3 questions
  • Intro to Python and Python crash course (section 7) for beginners
    00:57
  • repl.it Introduction
    06:33
  • Basics Review
    5 questions
  • Penetration Testing - Overview
    05:31
  • Penetration Testing Quiz
    3 questions
  • Preview05:27
  • Penetration Testing - Text Instructions
    00:08
  • Penetration Testing - Remediation
    08:28
  • Port Scanning - Overview
    04:29
  • Port Scanning Quiz
    3 questions
  • Port Scanning - Code Example
    03:38
  • Port Scanning - Text Instructions
    00:17
  • Port Scanning - Remediation
    03:51
  • Botnets - Overview
    06:01
  • Botnets - Code Example
    05:06
  • Botnets - Code Example Continued
    05:04
  • Botnets - Text Instructions
    00:20
  • Botnets - Remediation
    12:15
  • Cyber Security Topics Review 1
    3 questions
  • Code Exploits - Overview
    04:51
  • Code Exploits - Code Example
    05:33
  • Code Exploits - Text Instructions
    00:03
  • Code Exploits - Remediation
    03:55
  • Forensic Investigation - Overview
    05:31
  • Forensic Investigation - Code Example
    08:29
  • Forensic Investigation - Text Instructions
    00:08
  • Forensic Investigation - Remediation
    05:09
  • Network Traffic Analysis - Overview
    05:11
  • Network Traffic Analysis - Code Example
    04:28
  • Network Traffic Analysis - Text Instructions
    00:02
  • Network Traffic Analysis - Remediation
    03:43
  • Cyber Security Topics Review 2
    3 questions
  • Wireless - Overview
    04:33
  • Wireless - Code Example
    03:08
  • Wireless - Text Instructions
    00:05
  • Wireless - Remediation
    09:58
  • Web Reconnaissance - Overview
    05:31
  • Web Reconnaissance - Code Example
    09:36
  • Web Reconnaissance - Text Instructions
    00:11
  • Web Reconnaissance - Remediation
    06:30
  • Antivirus Evasion - Overview
    05:39
  • Antivirus Evasion - Code Example
    07:02
  • Antivirus Evasion - Text Instructions
    00:04
  • Antivirus Evasion - Remediation
    03:33
  • Social Engineering - Overview
    06:57
  • Social Engineering - Code Example
    04:30
  • Social Engineering - Text Instructions
    00:32
  • Social Engineering - Remediation
    02:56
  • Cyber Security Topics Review 3
    5 questions
  • Assignment 1 - Log Analysis
    1 question

  • Introduction to Section 3 - Building your own tool with Python
    01:15
  • Installing Python Locally
    00:18
  • Tool Development with Python - Overview
    04:54
  • Introduction to Pip
    03:55
  • Introduction to Pip - Text Instructions
    00:05
  • Basic Python Script
    03:24
  • Basic Python Script - Text Instructions
    00:17
  • Preview03:16
  • Command Line Arguments - Text Instructions
    00:10
  • Argument Parsing
    06:29
  • Argument Parsing - Text Instructions
    00:10
  • Python Tools Review 1
    3 questions
  • Validating Input
    03:37
  • Validating Input - Text Instructions
    00:11
  • Sending Requests to the Web
    02:40
  • Sending Requests to the Web - Text Instructions
    00:10
  • Parsing Results
    06:43
  • Parsing Results - Text Instructions
    00:19
  • Checking Forms
    04:31
  • Checking Forms - Text Instructions
    00:07
  • Python Tools Review 2
    3 questions
  • Generating the Report
    02:19
  • Generating the Report - Text Instructions
    00:13
  • Checking Comments
    06:32
  • Checking Comments - Text Instructions
    00:08
  • Checking Inputs
    05:12
  • Checking Inputs - Text Instructions
    00:08
  • Improving the Report
    02:57
  • Improving the Report - Text Instructions
    00:05
  • Configuration from File
    03:42
  • Configuration from File - Text Instructions
    00:05
  • Using Config Settings
    07:16
  • Using Config Settings - Text Instructions
    00:28
  • Merging the Configs
    02:09
  • Merging the Configs - Text Instructions
    00:07
  • Outputting the Report
    08:36
  • Outputting the Report - Text Instructions
    00:21
  • Python Tools Review 3
    3 questions
  • Pushing to GitHub
    04:29
  • Pushing to GitHub - Text Instructions
    00:08
  • Testing the Tool
    06:05
  • Writing the Documentation
    06:24
  • Distributing Your Tool
    05:48
  • Python Tools Review 4
    4 questions
  • Vulnerability Report for a Website
    1 question

  • Section 4 Introduction
    01:17
  • Web Application Security Introduction
    06:00
  • OWASP Overview
    04:37
  • Introduction to the OWASP Top 10
    01:27
  • OWASP and Vulnerabilities Review
    3 questions
  • Rails Overview
    03:14
  • PHP Overview
    05:08
  • Installing Rails and PHP
    00:56
  • OWASP Top 10 Vulnerabilities Example Code - Where to get it
    00:07
  • Command Injection - Overview
    04:48
  • Command Injection - Rails Example
    06:44
  • Command Injection - Rails example - Text Instructions
    00:11
  • Command Injection - PHP Example
    04:10
  • Command Injection - PHP example - Text Instructions
    00:00
  • SQL Injection - Overview
    06:25
  • SQL Injection - Rails Example
    03:59
  • SQL Injection - Rails example - Text Instructions
    00:01
  • SQL Injection - PHP Example
    03:31
  • SQL Injection Remediation - PHP Example
    02:26
  • SQL Injection - PHP example - Text Instructions
    00:01
  • Password Complexity - Overview
    06:46
  • Password Complexity - Rails Example
    06:50
  • Password Complexity - Rails example - Text Instructions
    00:01
  • Password Complexity - PHP Example
    06:28
  • Password Complexity - PHP example - Text Instructions
    00:01
  • Information Leakage - Overview
    04:56
  • Information Leakage - Rails Example
    03:07
  • Information Leakage - Rails example - Text Instructions
    00:00
  • Information Leakage - PHP Example
    07:13
  • Information Leakage - PHP example - Text Instructions
    00:01
  • Sensitive Data Exposure - Overview
    04:53
  • Sensitive Data Exposure - Rails Example
    04:23
  • Sensitive Data Exposure - Rails example - Text Instructions
    00:01
  • Sensitive Data Exposure - PHP Example
    02:54
  • Sensitive Data Exposure - PHP example - Text Instructions
    00:01
  • Web Application Security Review 1
    3 questions
  • XML External Entities (XXE) - Overview
    04:40
  • XML External Entities (XXE) - Rails Example
    04:36
  • XML External Entities (XXE) - Rails example - Text Instructions
    00:00
  • XML External Entities (XXE) - PHP Example
    04:28
  • XML External Entities (XXE) - PHP example - Text Instructions
    00:01
  • Broken Access Control - Overview
    05:12
  • Broken Access Control - Rails Example
    11:56
  • Broken Access Control - Rails example - Text Instructions
    00:00
  • Broken Access Control - PHP Example
    03:39
  • Broken Access Control - PHP example - Text Instructions
    00:01
  • Security Misconfiguration - Overview
    05:50
  • Security Misconfiguration - Rails Example
    03:46
  • Security Misconfiguration - Rails example - Text Instructions
    00:00
  • Security Misconfiguration - PHP Example
    03:28
  • Security Misconfiguration - PHP example - Text Instructions
    00:01
  • Web Application Security Review 2
    3 questions
  • Cross-Site Scripting (XSS) - Overview
    01:34
  • Cross-Site Scripting (XSS) - Rails Example
    05:09
  • Cross-Site Scripting (XSS) - Rails example - Text Instructions
    00:01
  • Cross-Site Scripting (XSS) - PHP Example
    05:50
  • Cross-Site Scripting (XSS) - PHP example - Text Instructions
    00:01
  • Insecure Deserialization - Overview
    03:46
  • Insecure Deserialization - Rails Example
    05:18
  • Insecure Deserialization - Rails example - Text Instructions
    00:01
  • Insecure Deserialization - PHP Example
    07:22
  • Insecure Deserialization - PHP example - Text Instructions
    00:01
  • Using Components with Known Vulnerabilities - Overview
    05:28
  • Using Components with Known Vulnerabilities - Rails Example
    11:01
  • Using Components with Known Vulnerabilities - Rails example - Text Instructions
    00:06
  • Using Components with Known Vulnerabilities - PHP Example
    04:38
  • Using Components with Known Vulnerabilities - PHP example - Text Instructions
    00:01
  • Insufficient Logging and Monitoring - Overview
    04:06
  • Insufficient Logging Monitoring - Rails example
    05:49
  • Insufficient Logging and Monitoring - Rails Example - Text Instructions
    00:00
  • Insufficient Logging Monitoring - PHP example - Text Instructions
    06:14
  • Insufficient Logging and Monitoring - PHP Example - Text Instructions
    00:01
  • Web Application Security Review 3
    3 questions
  • Web Security Analysis Tool
    09:17
  • Check for Vulnerabilities in a Webapp
    1 question

  • Multi-Factor Authentication
    16:35
  • Ethical Hacking
    05:08
  • Password Complexity
    11:18
  • Physical Security
    10:31
  • Data Breaches
    09:34
  • Cloud Security
    11:44

  • Password Encryption Tool Introduction
    00:56
  • Password Encryption Overview
    02:35
  • Creating the Tool
    02:48
  • Command Line Arguments
    04:15
  • Adding Encryption
    04:45
  • Check If Encryption Works
    02:32
  • Password Encryption Tool - Source Code
    00:21

  • Installation and expectations
    01:34
  • Strings
    07:31
  • Numbers
    02:07
  • Strings and Numbers recap
    1 question
  • Lists, Tuples, Sets
    02:45
  • Dictionaries
    01:28
  • Branching and Functions/Methods
    09:40
  • Standard library and imports
    02:00
  • Object Oriented Programming: Classes
    08:08

  • Thank You!
    01:07
  • Appendix A: Acknowledgements
    00:22
  • Appendix B: Glossary
    00:20

Instructors

Mashrur Hossain
Technology Professional and Entrepreneur
Mashrur Hossain
  • 4.5 Instructor Rating
  • 16,614 Reviews
  • 113,323 Students
  • 13 Courses

Hi, I'm Mashrur, I'm a full-time programming instructor specializing in programming fundamentals, web application development, machine learning and cyber security. I have been a technology professional for over a decade and have degrees in Computer Science and Economics.

My niche is building comprehensive career focused technology courses for students entering new/complex and challenging fields in today's technology space. This is a nice segway for me, since my real passion is building and tinkering with programming languages. I love everything to do with development and learning about new tools and technologies. My favorite languages are Python and Ruby on Rails, and my favorite tech fields are web app development, machine learning and data-analytics (which is where Ruby on Rails and Python fall into place nicely). I encourage my students to focus on these technologies as well.

In my past (corporate) life, I worked with Enterprise Software Systems with roles played in analysis, development, management and training. I led projects using both agile and waterfall methodologies and thus am well versed in the inner workings of the software development and delivery world. 

During my time in corporate America, I realized how much I enjoyed training new hires and new team members and helping them succeed. I dedicated a good amount of time over 7 years on-boarding new analysts and developers and then worked with them to build and maintain systems which put me in a unique position to know and understand what new entrants to a field need in order to succeed. I strongly believe in focusing on fundamentals and practice; and not in shortcuts or gimmicks. 

So join me for my comprehensive career-focused technology courses as I guide you through the world of web application development, machine learning and cyber security using Python, Ruby on Rails, MySQL and others and bringing your ideas and passions to life. 

Evgeny Rahman
Professional Software Architect
Evgeny Rahman
  • 4.6 Instructor Rating
  • 586 Reviews
  • 76,669 Students
  • 3 Courses

I've been a software professional for over 15 years. I've worked with many different technologies at Fortune 100 companies and startups, delivering lots of successful software systems. My favorite topics are web applications, cyber security, cloud architecture, DevOps, and agile development. I love to keep up on what's new in the technology world and sharing my knowledge and skills with others who want to get into or get better at software, architecture, and information technology!

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.