A basic understanding of ethical hacking related concepts.
An eager and open mind!
If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:
Introduction and setup
Port and vulnerability scanning
SSH and FTP attacks
Sniffers, flooders and spoofers
Coding a multi-functioning reverse shell
Command and control center
Website penetration testing
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
Still not sold? Check out these great reviews!
"It's already fun wow. I enjoy learning ethical hacking and python"
"Great even for non-programmers!"
Thank you for taking the time to read this and we hope to see you in the course!
Who this course is for:
Python developers interested in ethical hacking and network security.
Students interested in learning Python, a powerful scripting language.
11 sections • 89 lectures • 17h 21m total length
Kali Linux installation
Adding Guest Additions
Coding a simple port scanner
Adding raw_input to our port scanner
Scanning the first 1,000 ports
Coding an advanced port scanner part 1
Coding an advanced port scanner part 2
Finishing and testing our scanner
Configuring IP address and installing Metasploitable
Returning banner from open port
Coding a vulnerability scanner part 1
Coding a vulnerability scanner part 2
Automating SSH login part 1
Automating SSH login part 2
Testing our SSH login program
Coding a SSH brute-forcer
Executing commands on target after brute-forcing SSH
Anonymous FTP login attack
Username & password list attack on FTP
SHA256, SHA512, MD5
Cracking SHA1 hash with online dictionary
Getting password from MD5 hash
Cracking crypt passwords with salt
Changing MAC address manually
Coding MAC address changer
Theory behind ARP spoofing
Crafting malicious ARP packet
Coding ARP spoofer
Forwarding packets and restoring ARP tables
Spoofing our IP address and sending message with TCP payload
Running SynFlooder with changed source IP address
Getting source and destination MAC address from received packets
The digital age is upon us. Would you like to build/protect the systems that shape our future?
I am here on Udemy to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.