Penetration Testing with Python

Learn to create your own hacking based programs in Python
4.1 (61 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
362 students enrolled
$10
$20
50% off
Take This Course
  • Lectures 33
  • Length 6.5 hours
  • Skill Level All Levels
  • Languages English, captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2016 English Closed captions available

Course Description

This course aims to teach student's about the importance of programming within Python when combined with penetration testing. No prior knowledge of Python or penetration is required as the course covers some of the fundamentals required within the Python language as well as explanations of what penetration testing is and examples of the stages used within a penetration test. 

Within the latter part of this course Python programming and penetration testing is combined with the student learning to create their own penetration testing programs, with the aim of the student gaining a deep understanding of how these programs work as opposed to blindly running off the shelf penetration testing programs.

What are the requirements?

  • No prior knowledge of Python is required as this course covers the fundamentals, a basic knowledge of using well known penetration testing tools would be advantageous but is not mandatory

What am I going to get from this course?

  • This course will give a fundamental through to intermediate understanding of Python functionality as well as how to practically apply those new skills in creating your own programs for penetration testing

Who is the target audience?

  • Anyone who is interested hacking and becoming more than just someone who uses tools and instead a pro who can write their own bespoke tools for penetration testing

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Course Introduction
05:04

This is the introduction to the course which includes the agenda for the upcoming Python course.

Section 2: Introduction
10:43

In this lecture the student will learn how to download Python and install it on a Windows operating system using the command line.

14:22

In this lecture the student will learn about interpreter and idle.

14:57

In this lecture the student will learn the basics of creating a sample program using Python.

18:09

In this lecture the student will learn about strings within Python.

17:09

In this lecture the student will learn about input statements within Python.

21:09

In this lecture the student will learn about reading and writing files within Python.

13:00

In this lecture the student will learn about various expressions within Python.

Section 3: Getting Started
13:48

In this lecture the student will learn the fundamentals of Tuples within Python.

21:20

In this lecture the student will learn about Loop statements within Python.

09:56

In this lecture the student will learn about conditional execution statements within Python.

14:29

In this lecture the student will learn about IF statements within Python.

12:15

In this lecture the student will learn about IF statements within Python.

13:49

In this lecture the student will learn about the while loop within Python.

Section 4: Ethical Hacking
08:25

In this lecture the student will learn what penetration testing is from an overview perspective.

06:51

This lecture covers the five different stages that are used within a penetration test.

16:51

In this lecture the student will learn how to build a web server in Python using socket programming techniques.

05:06

In this lecture the student will learn how to install Virtual Box onto their Windows operating system.

14:51

In this lecture the student will learn how to download and set up Kali

07:43

In this lecture the student will learn how to set up Python inside the newly created Kali virtual machine.

07:02

In this lecture the student will learn how to set up Wing IDE Editor

15:24

In this lecture the student will learn how to write a Python program to crack a password protected zip file.

07:49

In this lecture the student will learn how to create their own TCP client that will later be able to connect with a TCP server in the next lecture

07:28

In this lecture the student will learn how to create their own TCP server to connect to with a TCP client that was made in the previous lecture

07:35

In this lecture the student will learn how to read raw binary packets from system programs

15:24

In this lecture the student will learn how to import Nmap port scanner options into their own port scanning program

05:06

This is the part one lecture where the student will learn how to create their own traffic sniffer, similar to that of Wireshark or TCPdump

16:11

This is the part two lecture where the student will learn how to create their own traffic sniffer, similar to that of Wireshark or TCPdump

16:00

This is the part one lecture where the student will learn how to create their own brute force tool that can break the passwords of an FTP server   

10:32

This is the part two lecture where the student will learn how to create their own brute force tool that can break the passwords of an FTP server   

16:38

This is the part one lecture where the student will learn how to create their own SQL server to later test with SQLMap

15:31

This is the part two lecture where the student will learn how to create their own SQL server to later test with SQLMap

Section 5: Conclusion
02:29

The conclusion to the course and summary of what the student has learned.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

TWR Internet Solutions Ltd, Providing high quality, affordable material

TWR Internet Solutions Ltd was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking. The team each have over ten years experience in their specific fields, the company belief is to provide affordable training of a high standard to help aid people from all backgrounds in getting into specialist fields of computing.

Ready to start learning?
Take This Course