Ethical Hacking with Python
3.8 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,612 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking with Python to your Wishlist.

Add to Wishlist

Ethical Hacking with Python

Learn efficient programming with Python as well as hacking techniques using Python
3.8 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
2,612 students enrolled
Created by CyberTraining 365
Last updated 3/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 3.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Be Introduced to the Python programming language and socket programming.
  • Install Python 2.7.12 using Windows and Kali Linux
  • Learn the data types that comprise the Python programming language
  • How to use If statements in Python
  • How to use loops in Python.
  • How to use functions in Python.
  • How to handle files in Python
  • TCP Server and Client
  • UDP Server and Client
  • Retrieving hostname,IP and Banner grabbing
  • Socket Server Framework
  • Syn Flood attack with Scapy
  • Ping Sweep with Scapy
  • Object-oriented programming in python
  • Sniffing with Scapy
  • Buffer overflow and exploit writing with python
  • Forensics Investigation with Python
  • Modular Programming with Python
  • Exception Handling in Python
View Curriculum
Requirements
  • This course is intended for beginners
  • Have access to a Windows OS machine to simulate programming tutorials
  • Previous experience installing programming libraries and virtual machines preferred but not required.
Description

In this with Python course, you’ll run through the fundamentals of all things Python ranging from understanding how to craft simple lines of code using variables and statements to setting up and using dictionaries. Once we’ve covered the basics, we will go through some ethical hacking tutorials including –

  • Syn Flood attack with Scapy,
  • Buffer overflow and exploit writing with Python
  • Forensic Investigation using hashlib and pypdf.

Though targeted towards complete beginners, this course also serves as a handy refresher for seasoned programmers who want to sharpen their coding skills or use python in some ethical hacking scenarios. Here is the breakdown on what you will learn in this course - 

Introduction to python and socket programming – Introduce you to the Python programming language and socket programming.

Python Installation – How to install Python 2.7.12 using Windows and Kali Linux

Python data types – Learn the data types that comprise the Python programming language

Python if statements – How to use If statements in Python.

Python loops – How to use loops in Python.

Python Functions – How to use functions in Python.

Python File Handling – How to handle files in Python

TCP Server and Client - Learn how to create a TCP server and client with Python

UDP Server and ClientLearn how to create a UDP server and client with Python

Retrieving hostname IP and Banner grabbingLearn Socket.gethostname() and write a banner grabber.

Socket Server FrameworkLearn this framework to create TCP and UDP servers.

ScapyLearn how to use this Phyton program to send, sniff, dissect, and forge network packets.

Syn Flood attack with ScapyLearn how to do a SYN flood attack using scapy.

Ping Sweep with Scapy - Learn how to do a Ping Sweep with Scapy.

HTTP ServerLearn how to create your own web server with Python.       

Object-oriented programming in pythonLearn efficient Object-oriented programming in python

Sniffing with ScapyLearn Sniffing techniques with Scapy

Buffer overflow and exploit writing with pythonLearn how to write a Buffer overflow exploit in python

urllib and httplibLearn urllib and httplib libraries.

FtplibLearn how to use this library for File Transfer Protocol (FTP)

Forensics Investigation with PythonLearn Forensic investigation techniques using hashlib and pypdf.

Modular Programming with Python – Learn Modular Programming with Python  

Exception Handling in Python – Learn Exception Handling in Python


Who is the target audience?
  • For those who want to learn programming and don’t know where to start.
  • System Administrators / Network administrators who want to know how networking works in detail.
  • Information security professional who want to writes scripts/tools for their work easier.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
23 Lectures
03:35:55
+
Introduction to Python and Socket Programming
1 Lecture 08:17

This lecture goes over target group for this course, who created Python, what is Python, Python based apps in the real world, what is Socket programming, Socket programming definitions, and Socket Types.

Preview 08:17
+
Python Installation
1 Lecture 07:35

This lecture will guide you on installing Python 2.7.12

Preview 07:35
+
Python Data Types
1 Lecture 20:52

This lecture will go over the core data types in Python including; Int / float (number), String, Tuple, List, Dictionary, Files, Dynamically typed, and a demo.

Python Data Types
20:52
+
Python If Statements
1 Lecture 09:04

This lecture will go over the if statement and its variations. 

Python If Statements
09:04
+
Python Loops
1 Lecture 12:35

This lecture will go over the For and While loop and how to use them.

Python Loops
12:35
+
Python Functions
1 Lecture 07:04
Python Functions
07:04
+
Python File Handling
1 Lecture 10:14

This lecture will go over functions in Python.

Python File Handling
10:14
+
TCP Server and Client
1 Lecture 17:59

This lecture will go over file handling in Python including opening files, process mode, and a tutorial on how to use them.

TCP Server and Client
17:59
+
UDP Server and Client
1 Lecture 12:56
UDP Server and Client
12:56
+
Retrieving hostname, IP and Banner grabbing
1 Lecture 12:57
Retrieving hostname, IP and Banner grabbing
12:57
14 More Sections
About the Instructor
CyberTraining 365
4.1 Average rating
2,262 Reviews
44,758 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.