Cyber Security - Python and Web Applications
3.9 (173 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,776 students enrolled

Cyber Security - Python and Web Applications

Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!
3.9 (173 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,776 students enrolled
Last updated 10/2018
English
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 10.5 hours on-demand video
  • 69 articles
  • 2 downloadable resources
  • 1 coding exercise
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Start a career in Cyber Security
  • Analyze systems for vulnerabilities and security flaws
  • Build secure web applications
  • Use Python to build tools for security analysis
  • Use Python to build general purpose tools
  • Detect and analyze security threats to web applications
  • Be well versed in the current Cyber Security landscape
Requirements
  • No prior experience with Cyber Security required
  • Basic understanding of how the web works will be useful
  • No prior experience with programming necessary - Python crash course included in the course!
Description

*** Course updated 10/30/2018 (always kept up-to-date) ***

Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist - not just in theory - but in practice.  

Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.  

There is NO platform dependency in this course - You can use any platform you choose - Windows, MacOS and Linux.

No prior experience required with Python or any of the topics covered in this course - There is a Python crash course included!

This course covers the fundamental building blocks of your required skill set - some key items include:

  • Vulnerability Analysis

  • Building and Publishing Security Tools - Dynamic web app security scanner, Password hashing and encrypt tool among many others!

  • Security Scanning

  • Phishing Protection

  • Web Application Vulnerability Mitigation

  • Password Complexity Analysis

  • Antivirus Evasion Remediation

  • Multi-Factor Authentication

  • Network Traffic Analysis

  • Cloud Security

  • Ethical Hacking

  • Web Reconnaissance

  • Wireless Access Point Protection

  • Programming with Python

We also cover the biggest threats in the information technology world today, including:

  • Botnets

  • Code Exploits

  • Sensitive Data Exposure

  • SQL Injection

  • Social Engineering

  • Cross-Site Scripting

  • Port Scanning

  • and many more!

You will get lifetime access to over 100 lectures and 11 hours of video lectures plus corresponding text guides for the lectures! 

This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you'll get your money back, no questions asked!

So what are you waiting for? Learn Cyber Security, Python for Cyber Security and Web Application Security in a way that will advance your career and increase your knowledge, all in a fun and practical way!

Who this course is for:
  • Beginners in the cyber security and/or information technology world
  • Professionals looking to improve their knowledge in using Python for cyber security
  • Beginners in web application security
  • Students curious about security in information technology and its practical applications
  • Cyber security professional switching to Python
  • Student looking to learn Python programming and how it's applied in Cyber Security
Course content
Expand all 188 lectures 11:23:29
+ Introduction
8 lectures 29:32

Welcome to the course!

Preview 03:03

An overview of what we will be covering in this course and how it is structured.

Preview 01:53

We take a look at a quick example of a log analysis security tool.

This is the kind of tool that you will be able to build using Python once you finish this course.

We will use https://repl.it/ for this example.

Preview 10:22

The code for the log analyzer tool. Be sure to download the access.log file from the lecture resources to try as your sample input.

Preview 01:11

We take a look at another security tool, this time it is a password checker.

You will be able to easily build Python tools like these once you finish this course.

We will use the https://haveibeenpwned.com API for this example.

Preview 07:26
Sample Tool 2 - Text Instructions
00:37

We go over the development environment that we will be using for this course.

repl.it is at https://repl.it/

Development Environment Overview
04:33

We will add latest updates relating to the course in this text

Important course updates (don't skip)
00:25
+ Cyber Security
46 lectures 03:21:54

An introductory look at what is covered in section 2

Preview 00:45

We explore what is meant by cyber security in the modern world and what actually comprises the work of a cyber security professional.

What is Cyber Security?
08:01
Cyber Security Introduction Quiz
3 questions

We will review the methodology of cyber security professionals.

Explaining the methodology
07:12
Methodology Quiz
3 questions

In this brief text summary we will talk about Python and the crash course that's available as a bonus in section 7

Intro to Python and Python crash course (section 7) for beginners
00:57

An overview of repl.it and how to use Python with this great, free tool

repl.it Introduction
06:33
Basics Review
5 questions

Penetration Testing is a key practice for cyber security professionals. Here we go over the basics of what it is and the variables involved.

Penetration Testing - Overview
05:31
Penetration Testing Quiz
3 questions
Penetration Testing - Text Instructions
00:08
Penetration Testing - Remediation
08:28
Port Scanning - Overview
04:29
Port Scanning Quiz
3 questions
Port Scanning - Code Example
03:38
Port Scanning - Text Instructions
00:17
Port Scanning - Remediation
03:51

As the number of Internet-connected devices continue to grow, botnets are a dominant cause for concern in today's cyber security and information technology landscape. This is an overview of what they are and how they work, including an explanation of DDoS attacks.

Botnets - Overview
06:01
Botnets - Code Example
05:06
Botnets - Code Example Continued
05:04
Botnets - Text Instructions
00:20
Botnets - Remediation
12:15
Cyber Security Topics Review 1
3 questions
Code Exploits - Overview
04:51
Code Exploits - Code Example
05:33
Code Exploits - Text Instructions
00:03
Code Exploits - Remediation
03:55
Forensic Investigation - Overview
05:31
Forensic Investigation - Code Example
08:29
Forensic Investigation - Text Instructions
00:08
Forensic Investigation - Remediation
05:09
Network Traffic Analysis - Overview
05:11
Network Traffic Analysis - Code Example
04:28
Network Traffic Analysis - Text Instructions
00:02
Network Traffic Analysis - Remediation
03:43
Cyber Security Topics Review 2
3 questions
Wireless - Overview
04:33
Wireless - Code Example
03:08
Wireless - Text Instructions
00:05
Wireless - Remediation
09:58
Web Reconnaissance - Overview
05:31
Web Reconnaissance - Code Example
09:36
Web Reconnaissance - Text Instructions
00:11
Web Reconnaissance - Remediation
06:30

We explore the topic of antivirus evasion and how an application can bypass an antivirus scan.

Antivirus Evasion - Overview
05:39
Antivirus Evasion - Code Example
07:02
Antivirus Evasion - Text Instructions
00:04
Antivirus Evasion - Remediation
03:33

We take a look at the various non-technical ways in which attackers can get sensitive information and compromise information systems.

Social Engineering - Overview
06:57
Social Engineering - Code Example
04:30
Social Engineering - Text Instructions
00:32
Social Engineering - Remediation
02:56
Cyber Security Topics Review 3
5 questions
Create a Python script to analyze a given log file for suspicious activity
Assignment 1 - Log Analysis
1 question
+ Building a Security Tool
40 lectures 01:45:48

An introductory look at the content covered in section 3

Introduction to Section 3 - Building your own tool with Python
01:15
Installing Python Locally
00:18
Tool Development with Python - Overview
04:54
Introduction to Pip
03:55
Introduction to Pip - Text Instructions
00:05
Basic Python Script
03:24
Basic Python Script - Text Instructions
00:17
Command Line Arguments - Text Instructions
00:10
Argument Parsing
06:29
Argument Parsing - Text Instructions
00:10
Python Tools Review 1
3 questions
Validating Input
03:37
Validating Input - Text Instructions
00:11
Sending Requests to the Web
02:40
Sending Requests to the Web - Text Instructions
00:10
Parsing Results
06:43
Parsing Results - Text Instructions
00:19
Checking Forms
04:31
Checking Forms - Text Instructions
00:07
Python Tools Review 2
3 questions
Generating the Report
02:19
Generating the Report - Text Instructions
00:13
Checking Comments
06:32
Checking Comments - Text Instructions
00:08
Checking Inputs
05:12
Checking Inputs - Text Instructions
00:08
Improving the Report
02:57
Improving the Report - Text Instructions
00:05
Configuration from File
03:42
Configuration from File - Text Instructions
00:05
Using Config Settings
07:16
Using Config Settings - Text Instructions
00:28
Merging the Configs
02:09
Merging the Configs - Text Instructions
00:07
Outputting the Report
08:36
Outputting the Report - Text Instructions
00:21
Python Tools Review 3
3 questions
Pushing to GitHub
04:29
Pushing to GitHub - Text Instructions
00:08
Testing the Tool
06:05
Writing the Documentation
06:24
Distributing Your Tool
05:48
Python Tools Review 4
4 questions
Perform an assessment of a website of your choice (preferably one that you have developed) using this tool and provide a report on its vulnerabilities and how to remediate them, using your knowledge from the course.
Vulnerability Report for a Website
1 question
+ Web Application Security
70 lectures 03:46:04

A brief look at the content covered in section 4

Section 4 Introduction
01:17
Web Application Security Introduction
06:00
OWASP Overview
04:37
Introduction to the OWASP Top 10
01:27
OWASP and Vulnerabilities Review
3 questions
Rails Overview
03:14
PHP Overview
05:08
Installing Rails and PHP
00:56
OWASP Top 10 Vulnerabilities Example Code - Where to get it
00:07
Command Injection - Overview
04:48
Command Injection - Rails Example
06:44
Command Injection - Rails example - Text Instructions
00:11
Command Injection - PHP Example
04:10
Command Injection - PHP example - Text Instructions
00:00
SQL Injection - Overview
06:25
SQL Injection - Rails Example
03:59
SQL Injection - Rails example - Text Instructions
00:01
SQL Injection - PHP Example
03:31
SQL Injection Remediation - PHP Example
02:26
SQL Injection - PHP example - Text Instructions
00:01
Password Complexity - Overview
06:46
Password Complexity - Rails Example
06:50
Password Complexity - Rails example - Text Instructions
00:01
Password Complexity - PHP Example
06:28
Password Complexity - PHP example - Text Instructions
00:01
Information Leakage - Overview
04:56
Information Leakage - Rails Example
03:07
Information Leakage - Rails example - Text Instructions
00:00
Information Leakage - PHP Example
07:13
Information Leakage - PHP example - Text Instructions
00:01
Sensitive Data Exposure - Overview
04:53
Sensitive Data Exposure - Rails Example
04:23
Sensitive Data Exposure - Rails example - Text Instructions
00:01
Sensitive Data Exposure - PHP Example
02:54
Sensitive Data Exposure - PHP example - Text Instructions
00:01
Web Application Security Review 1
3 questions
XML External Entities (XXE) - Overview
04:40
XML External Entities (XXE) - Rails Example
04:36
XML External Entities (XXE) - Rails example - Text Instructions
00:00
XML External Entities (XXE) - PHP Example
04:28
XML External Entities (XXE) - PHP example - Text Instructions
00:01
Broken Access Control - Overview
05:12
Broken Access Control - Rails Example
11:56
Broken Access Control - Rails example - Text Instructions
00:00
Broken Access Control - PHP Example
03:39
Broken Access Control - PHP example - Text Instructions
00:01
Security Misconfiguration - Overview
05:50
Security Misconfiguration - Rails Example
03:46
Security Misconfiguration - Rails example - Text Instructions
00:00
Security Misconfiguration - PHP Example
03:28
Security Misconfiguration - PHP example - Text Instructions
00:01
Web Application Security Review 2
3 questions
Cross-Site Scripting (XSS) - Overview
01:34
Cross-Site Scripting (XSS) - Rails Example
05:09
Cross-Site Scripting (XSS) - Rails example - Text Instructions
00:01
Cross-Site Scripting (XSS) - PHP Example
05:50
Cross-Site Scripting (XSS) - PHP example - Text Instructions
00:01
Insecure Deserialization - Overview
03:46
Insecure Deserialization - Rails Example
05:18
Insecure Deserialization - Rails example - Text Instructions
00:01
Insecure Deserialization - PHP Example
07:22
Insecure Deserialization - PHP example - Text Instructions
00:01

Applications that use vulnerable components can often be the target of devastating breaches. It is important to understand the underlying issues with not keeping dependencies up to date.

Using Components with Known Vulnerabilities - Overview
05:28

A look at how using vulnerable components in Rails might happen and how to avoid and/or remediate it.

Using Components with Known Vulnerabilities - Rails Example
11:01
Using Components with Known Vulnerabilities - Rails example - Text Instructions
00:06

An example of how this vulnerability can look in a PHP app and how to remediate it.

Using Components with Known Vulnerabilities - PHP Example
04:38
Using Components with Known Vulnerabilities - PHP example - Text Instructions
00:01

A vulnerability that is often overlooked but one that can make a huge difference is not having enough logging and monitoring.

This is an explanation of why logging and monitoring are important.

Insufficient Logging and Monitoring - Overview
04:06

We look at an example of insufficient logging and monitoring and how to remediate this vulnerability in Rails.

Insufficient Logging Monitoring - Rails example
05:49
Insufficient Logging and Monitoring - Rails Example - Text Instructions
00:00

What does it look like when the "Insufficient Logging and Monitoring" vulnerability shows up in a PHP application? We take a look at that here.

Insufficient Logging Monitoring - PHP example - Text Instructions
06:14
Insufficient Logging and Monitoring - PHP Example - Text Instructions
00:01
Web Application Security Review 3
3 questions

We take a look at a popular web security analysis tool for Rails - Brakeman Security Scanner.

Web Security Analysis Tool
09:17
Using the techniques that you have learned, take a webapp that you have worked on in this or another course, and test it for vulnerabilities, preferably while running the web application locally. Make sure to not perform any activities that would impact infrastructure that is not owned by you.
Check for Vulnerabilities in a Webapp
1 question
+ Topics in Cyber Security
6 lectures 01:04:50
Multi-Factor Authentication
16:35
Ethical Hacking
05:08
Password Complexity
11:18
Physical Security
10:31
Data Breaches
09:34
Cloud Security
11:44
+ Python Password Encryption Tool
7 lectures 18:12
Password Encryption Tool Introduction
00:56
Password Encryption Overview
02:35
Creating the Tool
02:48
Command Line Arguments
04:15
Adding Encryption
04:45
Check If Encryption Works
02:32
Password Encryption Tool - Source Code
00:21
+ Python Crash Course
8 lectures 35:16

Tools we will use to learn python

Installation and expectations
01:34

Working with Strings in Python

Strings
07:31

In this lecture we learn how to work with numbers in Python

Numbers
02:07
Strings and Numbers recap
1 question

Investigate lists and tuples in Python

Lists, Tuples, Sets
02:45

In this lecture we will explore dictionaries

Dictionaries
01:28

We will explore adding conditional logic and make python respond to such logic along with writing functions

Branching and Functions/Methods
09:40

Explore how to work with imports and introduce the standard library

Standard library and imports
02:00

We explore basics of object oriented programming in this lecture

Object Oriented Programming: Classes
08:08
+ Summary
3 lectures 01:49

Thank you for taking the course!

Thank You!
01:07
Appendix A: Acknowledgements
00:22
Appendix B: Glossary
00:20