Penetration Testing with Python
4.2 (73 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
480 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Penetration Testing with Python to your Wishlist.

Add to Wishlist

Penetration Testing with Python

Learn to create your own hacking based programs in Python
4.2 (73 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
480 students enrolled
Last updated 9/2016
English
English
Current price: $10 Original price: $30 Discount: 67% off
30-Day Money-Back Guarantee
Includes:
  • 6.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • This course will give a fundamental through to intermediate understanding of Python functionality as well as how to practically apply those new skills in creating your own programs for penetration testing
View Curriculum
Requirements
  • No prior knowledge of Python is required as this course covers the fundamentals, a basic knowledge of using well known penetration testing tools would be advantageous but is not mandatory
Description

This course aims to teach student's about the importance of programming within Python when combined with penetration testing. No prior knowledge of Python or penetration is required as the course covers some of the fundamentals required within the Python language as well as explanations of what penetration testing is and examples of the stages used within a penetration test. 

Within the latter part of this course Python programming and penetration testing is combined with the student learning to create their own penetration testing programs, with the aim of the student gaining a deep understanding of how these programs work as opposed to blindly running off the shelf penetration testing programs.

Who is the target audience?
  • Anyone who is interested hacking and becoming more than just someone who uses tools and instead a pro who can write their own bespoke tools for penetration testing
Curriculum For This Course
Expand All 33 Lectures Collapse All 33 Lectures 06:43:06
+
Course Introduction
1 Lecture 05:04

This is the introduction to the course which includes the agenda for the upcoming Python course.

Preview 05:04
+
Introduction
7 Lectures 01:49:29

In this lecture the student will learn how to download Python and install it on a Windows operating system using the command line.

Downloading Python
10:43

In this lecture the student will learn about interpreter and idle.

Interpreter and Idle
14:22

In this lecture the student will learn the basics of creating a sample program using Python.

Nuts and Bolts of a Sample Program
14:57

In this lecture the student will learn about strings within Python.

Python Strings
18:09

In this lecture the student will learn about input statements within Python.

Getting Input
17:09

In this lecture the student will learn about reading and writing files within Python.

Reading and Writing Files
21:09

In this lecture the student will learn about various expressions within Python.

Python Expressions
13:00
+
Getting Started
6 Lectures 01:25:37

In this lecture the student will learn the fundamentals of Tuples within Python.

Tuples Fundamentals
13:48

In this lecture the student will learn about Loop statements within Python.

All About Loops
21:20

In this lecture the student will learn about conditional execution statements within Python.

Conditional Execution
09:56

In this lecture the student will learn about IF statements within Python.

Preview 14:29

In this lecture the student will learn about IF statements within Python.

Additional IF Statements
12:15

In this lecture the student will learn about the while loop within Python.

The While Loop
13:49
+
Ethical Hacking
18 Lectures 03:20:27

In this lecture the student will learn what penetration testing is from an overview perspective.

What is Penetration Testing
08:25

This lecture covers the five different stages that are used within a penetration test.

Five Phases of Penetration testing
06:51

In this lecture the student will learn how to build a web server in Python using socket programming techniques.

Building a WebServer
16:51

In this lecture the student will learn how to install Virtual Box onto their Windows operating system.

Installing VirtualBox
05:06

In this lecture the student will learn how to download and set up Kali

Downloading and Installing Kali Linux
14:51

In this lecture the student will learn how to set up Python inside the newly created Kali virtual machine.

Download Python Kali Linux
07:43

In this lecture the student will learn how to set up Wing IDE Editor

Installing Wing IDE Editor
07:02

In this lecture the student will learn how to write a Python program to crack a password protected zip file.

First Penetration Testing Program Using Python
15:24

In this lecture the student will learn how to create their own TCP client that will later be able to connect with a TCP server in the next lecture

TCP Client in Python
07:49

In this lecture the student will learn how to create their own TCP server to connect to with a TCP client that was made in the previous lecture

TCP Server in Python
07:28

In this lecture the student will learn how to read raw binary packets from system programs

Raw Binary Packets
07:35

In this lecture the student will learn how to import Nmap port scanner options into their own port scanning program

Port Scanning Using NMap
15:24

This is the part one lecture where the student will learn how to create their own traffic sniffer, similar to that of Wireshark or TCPdump

Sniffing Part 1
05:06

This is the part two lecture where the student will learn how to create their own traffic sniffer, similar to that of Wireshark or TCPdump

Sniffing Part 2
16:11

This is the part one lecture where the student will learn how to create their own brute force tool that can break the passwords of an FTP server   

Preview 16:00

This is the part two lecture where the student will learn how to create their own brute force tool that can break the passwords of an FTP server   

Creating a Brute Force Tool Part 2
10:32

This is the part one lecture where the student will learn how to create their own SQL server to later test with SQLMap

SQl Injection part 1
16:38

This is the part two lecture where the student will learn how to create their own SQL server to later test with SQLMap

SQL Injection Part 2
15:31
+
Conclusion
1 Lecture 02:29

The conclusion to the course and summary of what the student has learned.

Preview 02:29
About the Instructor
TWR Internet Solutions Ltd
4.3 Average rating
105 Reviews
703 Students
2 Courses
Providing high quality, affordable material

TWR Internet Solutions Ltd was formed as part of a collaboration of experts specialising in networking, forensics, programming and ethical hacking. The team each have over ten years experience in their specific fields, the company belief is to provide affordable training of a high standard to help aid people from all backgrounds in getting into specialist fields of computing.