Companies Home Search Profile

Cyber Security - Python and Web Applications

Focused View

Mashrur Hossain

10:39:09

0 View
  • 01-Description-of-Training.html
  • 02-Video-Overview-(2-22-).mp4
    02:22
  • 01-Introduction-(3-03-).mp4
    03:03
  • 02-Course-Work-Overview-(1-53-).mp4
    01:53
  • 03-Sample-Tool-1---Log-Analyzer-(10-22-).mp4
    10:22
  • 04-Sample-Tool-1---Text-Instructions.html
  • 05-Sample-Tool-2---Password-Checker-(7-26-).mp4
    07:26
  • 06-Sample-Tool-2---Text-Instructions.html
  • 07-Development-Environment-Overview-(4-33-).mp4
    04:33
  • 01-Cyber-Security-Introduction-to-Section-2-(0-45-).mp4
    00:45
  • 02-What-is-Cyber-Security-(8-01-).mp4
    08:01
  • 03-Explaining-the-methodology-(7-12-).mp4
    07:12
  • 04-repl.it-Introduction-(6-33-).mp4
    06:33
  • 05-Penetration-Testing---Overview-(5-31-).mp4
    05:31
  • 06-Penetration-Testing---Code-Example-(5-27-).mp4
    05:27
  • 07-Penetration Testing - Text Instructions.txt
  • 08-Penetration-Testing---Remediation-(8-28-).mp4
    08:28
  • 09-Port-Scanning---Overview-(4-29-).mp4
    04:29
  • 10-Port-Scanning---Code-Example-(3-38-).mp4
    03:38
  • 11-Port Scanning - Text Instructions.txt
  • 12-Port-Scanning---Remediation-(3-51-).mp4
    03:51
  • 13-Botnets---Overview-(6-01-).mp4
    06:01
  • 14-Botnets---Code-Example-(5-06-).mp4
    05:06
  • 15-Botnets---Code-Example-Continued-(5-04-).mp4
    05:04
  • 16-Botnets - Text Instructions.txt
  • 17-Botnets---Remediation-(12-15-).mp4
    12:15
  • 18-Code-Exploits---Overview-(4-51-).mp4
    04:51
  • 19-Code-Exploits---Code-Example-(5-33-).mp4
    05:33
  • 20-Code Exploits - Text Instructions.txt
  • 21-Code-Exploits---Remediation-(3-55-).mp4
    03:55
  • 22-Forensic-Investigation---Overview-(5-31-).mp4
    05:31
  • 23-Forensic-Investigation---Code-Example-(8-29-).mp4
    08:29
  • 24-Forensic Investigation - Text Instructions.txt
  • 25-Forensic-Investigation---Remediation-(5-09-).mp4
    05:09
  • 26-Network-Traffic-Analysis---Overview-(5-11-).mp4
    05:11
  • 27-Network-Traffic-Analysis---Code-Example-(4-28-).mp4
    04:28
  • 28-Network Traffic Analysis - Text Instructions.txt
  • 29-Network-Traffic-Analysis---Remediation-(3-43-).mp4
    03:43
  • 30-Wireless---Overview-(4-33-).mp4
    04:33
  • 31-Wireless---Code-Example-(3-08-).mp4
    03:08
  • 32-Wireless - Text Instructions.txt
  • 33-Wireless---Remediation-(9-58-).mp4
    09:58
  • 34-Web-Reconnaissance---Overview-(5-31-).mp4
    05:31
  • 35-Web-Reconnaissance---Code-Example-(9-36-).mp4
    09:36
  • 36-Web Reconnaissance - Text Instructions.txt
  • 37-Web-Reconnaissance---Remediation-(6-30-).mp4
    06:30
  • 38-Antivirus-Evasion---Overview-(5-39-).mp4
    05:39
  • 39-Antivirus-Evasion---Code-Example-(7-02-).mp4
    07:02
  • 40-Antivirus Evasion - Text Instructions.txt
  • 41-Antivirus-Evasion---Remediation-(3-33-).mp4
    03:33
  • 42-Social-Engineering---Overview-(6-57-).mp4
    06:57
  • 43-Social-Engineering---Code-Example-(4-30-).mp4
    04:30
  • 44-Social Engineering - Text Instructions.txt
  • 45-Social-Engineering---Remediation-(2-56-).mp4
    02:56
  • 01-Introduction-to-Section-3---Building-your-own-tool-with-Python-(1-15-).mp4
    01:15
  • 02-Installing-Python-Locally.html
  • 03-Tool-Development-with-Python---Overview-(4-54-).mp4
    04:54
  • 04-Introduction-to-Pip-(3-55-).mp4
    03:55
  • 05-Introduction-to-Pip---Text-instructions.html
  • 06-Basic-Python-Script-(3-24-).mp4
    03:24
  • 07-Basic-Python-Script---Text-Instructions.html
  • 08-Command-Line-Arguments-(3-16-).mp4
    03:16
  • 09-Command-Line-Arguments---Text-Instructions.html
  • 10-Argument-Parsing-(6-29-).mp4
    06:29
  • 11-Argument-Parsing---Text-Instructions.html
  • 12-Validating-Input-(3-37-).mp4
    03:37
  • 13-Validating-Input---Text-Instructions.html
  • 14-Sending-Requests-to-the-Web-(2-40-).mp4
    02:40
  • 15-Sending-Requests-to-the-Web---Text-Instructions.html
  • 16-Parsing-Results-(6-43-).mp4
    06:43
  • 17-Parsing-Results---Text-Instructions.html
  • 18-Checking-Forms-(4-31-).mp4
    04:31
  • 19-Checking-Forms---Text-Instructions.html
  • 20-Generating-the-Report-(2-19-).mp4
    02:19
  • 21-Generating-the-Report---Text-Instructions.html
  • 22-Checking-Comments-(6-32-).mp4
    06:32
  • 23-Checking-Comments---Text-Instructions.html
  • 24-Checking-Inputs-(5-12-).mp4
    05:12
  • 25-Checking-Inputs---Text-Instructions.html
  • 26-Improving-the-Report-(2-57-).mp4
    02:57
  • 27-Improving-the-Report---Text-Instructions.html
  • 28-Configuration-from-File-(3-42-).mp4
    03:42
  • 29-Configuration-from-File---Text-Instructions.html
  • 30-Using-Config-Settings-(7-16-).mp4
    07:16
  • 31-Using-Config-Settings---Text-Instructions.html
  • 32-Merging-the-Configs-(2-09-).mp4
    02:09
  • 33-Merging-the-Configs---Text-Instructions.html
  • 34-Outputting-the-Report-(8-36-).mp4
    08:36
  • 35-Outputting-the-Report---Text-Instructions.html
  • 36-Pushing-to-GitHub-(4-29-).mp4
    04:29
  • 37-Pushing-to-GitHub---Text-Instructions.html
  • 38-Testing-the-Tool-(6-05-).mp4
    06:05
  • 39-Writing-the-Documentation-(6-24-).mp4
    06:24
  • 40-Distributing-Your-Tool-(5-48-).mp4
    05:48
  • 01-Section-4-Introduction-(1-17-).mp4
    01:17
  • 02-Web-Application-Security-Introduction-(6-00-).mp4
    06:00
  • 03-OWASP-Overview-(4-37-).mp4
    04:37
  • 04-Introduction-to-the-OWASP-Top-10-(1-27-).mp4
    01:27
  • 05-Rails-Overview-(3-14-).mp4
    03:15
  • 06-PHP-Overview-(5-08-).mp4
    05:08
  • 07-Installing-Rails-and-PHP.html
  • 08-OWASP-Top-10-Vulnerabilities-Example-Code---Where-to-get-it.html
  • 09-Command-Injection---Overview-(4-48-).mp4
    04:48
  • 10-Command-Injection---Rails-Example-(6-44-).mp4
    06:44
  • 11-Command-Injection---Rails-example---Text-Instructions.html
  • 12-Command-Injection---PHP-Example-(4-10-).mp4
    04:10
  • 13-Command-Injection---PHP-example---Text-Instructions.html
  • 14-SQL-Injection---Overview-(6-25-).mp4
    06:25
  • 15-SQL-Injection---Rails-Example-(3-59-).mp4
    03:59
  • 16-SQL-Injection---Rails-example---Text-Instructions.html
  • 17-SQL-Injection---PHP-Example-(3-31-).mp4
    03:31
  • 18-SQL-Injection-Remediation---PHP-Example-(2-26-).mp4
    02:26
  • 19-SQL-Injection---PHP-example---Text-Instructions.html
  • 20-Password-Complexity---Overview-(6-46-).mp4
    06:47
  • 21-Password-Complexity---Rails-Example-(6-50-).mp4
    06:50
  • 22-Password-Complexity---Rails-example---Text-Instructions.html
  • 23-Password-Complexity---PHP-Example-(6-28-).mp4
    06:28
  • 24-Password-Complexity---PHP-example---Text-Instructions.html
  • 25-Information-Leakage---Overview-(4-56-).mp4
    04:56
  • 26-Information-Leakage---Rails-Example-(3-07-).mp4
    03:07
  • 27-Information-Leakage---Rails-example---Text-Instructions.html
  • 28-Information-Leakage---PHP-Example-(7-13-).mp4
    07:13
  • 29-Information-Leakage---PHP-example---Text-Instructions.html
  • 30-Sensitive-Data-Exposure---Overview-(4-53-).mp4
    04:53
  • 31-Sensitive-Data-Exposure---Rails-Example-(4-23-).mp4
    04:23
  • 32-Sensitive-Data-Exposure---Rails-example---Text-Instructions.html
  • 33-Sensitive-Data-Exposure---PHP-Example-(2-54-).mp4
    02:54
  • 34-Sensitive-Data-Exposure---PHP-example---Text-Instructions.html
  • 35-XML-External-Entities-(XXE)---Overview-(4-40-).mp4
    04:40
  • 36-XML-External-Entities-(XXE)---Rails-Example-(4-36-).mp4
    04:36
  • 37-XML-External-Entities-(XXE)---Rails-example---Text-Instructions.html
  • 38-XML-External-Entities-(XXE)---PHP-Example-(4-28-).mp4
    04:28
  • 39-XML-External-Entities-(XXE)---PHP-example---Text-Instructions.html
  • 40-Broken-Access-Control---Overview-(5-12-).mp4
    05:12
  • 41-Broken-Access-Control---Rails-Example-(11-56-).mp4
    11:56
  • 42-Broken-Access-Control---Rails-example---Text-Instructions.html
  • 43-Broken-Access-Control---PHP-Example-(3-39-).mp4
    03:39
  • 44-Broken-Access-Control---PHP-example---Text-Instructions.html
  • 45-Security-Misconfiguration---Overview-(5-50-).mp4
    05:50
  • 46-Security-Misconfiguration---Rails-Example-(3-46-).mp4
    03:46
  • 47-Security-Misconfiguration---Rails-example---Text-Instructions.html
  • 48-Security-Misconfiguration---PHP-Example-(3-28-).mp4
    03:28
  • 49-Security-Misconfiguration---PHP-example---Text-Instructions.html
  • 50-Cross-Site-Scripting-(XSS)---Overview-(1-34-).mp4
    01:34
  • 51-Cross-Site-Scripting-(XSS)---Rails-Example-(5-09-).mp4
    05:09
  • 52-Cross-Site-Scripting-(XSS)---Rails-example---Text-Instructions.html
  • 53-Cross-Site-Scripting-(XSS)---PHP-Example-(5-50-).mp4
    05:50
  • 54-Cross-Site-Scripting-(XSS)---PHP-example---Text-Instructions.html
  • 55-Insecure-Deserialization---Overview-(3-46-).mp4
    03:46
  • 56-Insecure-Deserialization---Rails-Example-(5-18-).mp4
    05:18
  • 57-Insecure-Deserialization---Rails-example---Text-Instructions.html
  • 58-Insecure-Deserialization---PHP-Example-(7-22-).mp4
    07:22
  • 59-Insecure-Deserialization---PHP-example---Text-Instructions.html
  • 60-Using-Components-with-Known-Vulnerabilities---Overview-(5-28-).mp4
    05:28
  • 61-Using-Components-with-Known-Vulnerabilities---Rails-Example-(11-01-).mp4
    11:01
  • 62-Using-Components-with-Known-Vulnerabilities---Rails-example---Text-Instructions.html
  • 63-Using-Components-with-Known-Vulnerabilities---PHP-Example-(4-38-).mp4
    04:38
  • 64-Using-Components-with-Known-Vulnerabilities---PHP-example---Text-Instructions.html
  • 65-Insufficient-Logging-and-Monitoring---Overview-(4-06-).mp4
    04:06
  • 66-Insufficient-Logging-Monitoring---Rails-example-(5-49-).mp4
    05:49
  • 67-Insufficient-Logging-and-Monitoring---Rails-Example---Text-Instructions.html
  • 68-Insufficient-Logging-Monitoring---PHP-example-(6-14-).mp4
    06:14
  • 69-Insufficient-Logging-and-Monitoring---PHP-Example---Text-Instructions.html
  • 70-Web-Security-Analysis-Tool-(9-17-).mp4
    09:17
  • 01-Multi-Factor-Authentication-(16-35-).mp4
    16:35
  • 02-Ethical-Hacking-(5-08-).mp4
    05:08
  • 03-Password-Complexity-(11-18-).mp4
    11:18
  • 04-Physical-Security-(10-31-).mp4
    10:31
  • 05-Data-Breaches-(9-34-).mp4
    09:34
  • 06-Cloud-Security-(11-44-).mp4
    11:44
  • 01-Password-Encryption-Tool-Introduction-(0-56-).mp4
    00:56
  • 02-Password-Encryption-Overview-(2-35-).mp4
    02:35
  • 03-Creating-the-Tool-(2-48-).mp4
    02:48
  • 04-Command-Line-Arguments-(4-15-).mp4
    04:15
  • 05-Adding-Encryption-(4-45-).mp4
    04:45
  • 06-Check-If-Encryption-Works-(2-32-).mp4
    02:32
  • 07-Password-Encryption-Tool---Source-Code.html
  • 01-Installation-and-expectations.html
  • 02-Strings.html
  • 03-Numbers.html
  • 04-Lists,-Tuples,-Sets.html
  • 05-Dictionaries.html
  • 06-Branching-and-Functions-Methods.html
  • 07-Standard-library-and-imports.html
  • 08-Object-Oriented-Programming--Classes.html
  • 01-Thank-You!-(1-07-).mp4
    01:07
  • 02-Appendix-A--Acknowledgements.html
  • 03-Appendix-B--Glossary.html
  • Description


    Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!

    What You'll Learn?


    • Start a career in Cyber Security
    • Analyze systems for vulnerabilities and security flaws
    • Build secure web applications
    • Use Python to build tools for security analysis
    • Use Python to build general purpose tools
    • Detect and analyze security threats to web applications
    • Be well versed in the current Cyber Security landscape

    Who is this for?


  • Beginners in the cyber security and/or information technology world
  • Professionals looking to improve their knowledge in using Python for cyber security
  • Beginners in web application security
  • Students curious about security in information technology and its practical applications
  • Cyber security professional switching to Python
  • Student looking to learn Python programming and how it's applied in Cyber Security
  • What You Need to Know?


  • No prior experience with Cyber Security required
  • Basic understanding of how the web works will be useful
  • No prior experience with programming necessary - Python crash course included in the course!
  • More details


    Description

    *** Course updated 10/30/2018 (always kept up-to-date) ***

    Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist - not just in theory - but in practice.  

    Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.  

    There is NO platform dependency in this course - You can use any platform you choose - Windows, MacOS and Linux.

    No prior experience required with Python or any of the topics covered in this course - There is a Python crash course included!

    This course covers the fundamental building blocks of your required skill set - some key items include:

    • Vulnerability Analysis

    • Building and Publishing Security Tools - Dynamic web app security scanner, Password hashing and encrypt tool among many others!

    • Security Scanning

    • Phishing Protection

    • Web Application Vulnerability Mitigation

    • Password Complexity Analysis

    • Antivirus Evasion Remediation

    • Multi-Factor Authentication

    • Network Traffic Analysis

    • Cloud Security

    • Ethical Hacking

    • Web Reconnaissance

    • Wireless Access Point Protection

    • Programming with Python

    We also cover the biggest threats in the information technology world today, including:

    • Botnets

    • Code Exploits

    • Sensitive Data Exposure

    • SQL Injection

    • Social Engineering

    • Cross-Site Scripting

    • Port Scanning

    • and many more!

    You will get lifetime access to over 100 lectures and 11 hours of video lectures plus corresponding text guides for the lectures! 

    This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you'll get your money back, no questions asked!

    So what are you waiting for? Learn Cyber Security, Python for Cyber Security and Web Application Security in a way that will advance your career and increase your knowledge, all in a fun and practical way!

    Who this course is for:

    • Beginners in the cyber security and/or information technology world
    • Professionals looking to improve their knowledge in using Python for cyber security
    • Beginners in web application security
    • Students curious about security in information technology and its practical applications
    • Cyber security professional switching to Python
    • Student looking to learn Python programming and how it's applied in Cyber Security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Mashrur Hossain
    Mashrur Hossain
    Instructor's Courses
    Hi, I'm Mashrur, I'm a full-time programming instructor specializing in programming fundamentals, web application development, machine learning and cyber security. I have been a technology professional for over a decade and have degrees in Computer Science and Economics.My niche is building comprehensive career focused technology courses for students entering new/complex and challenging fields in today's technology space. This is a nice segway for me, since my real passion is building and tinkering with programming languages. I love everything to do with development and learning about new tools and technologies. My favorite languages are Python and Ruby on Rails, and my favorite tech fields are web app development, machine learning and data-analytics (which is where Ruby on Rails and Python fall into place nicely). I encourage my students to focus on these technologies as well.In my past (corporate) life, I worked with Enterprise Software Systems with roles played in analysis, development, management and training. I led projects using both agile and waterfall methodologies and thus am well versed in the inner workings of the software development and delivery world.  During my time in corporate America, I realized how much I enjoyed training new hires and new team members and helping them succeed. I dedicated a good amount of time over 7 years on-boarding new analysts and developers and then worked with them to build and maintain systems which put me in a unique position to know and understand what new entrants to a field need in order to succeed. I strongly believe in focusing on fundamentals and practice; and not in shortcuts or gimmicks.  So join me for my comprehensive career-focused technology courses as I guide you through the world of web application development, machine learning and cyber security using Python, Ruby on Rails, MySQL and others and bringing your ideas and passions to life.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 120
    • duration 10:39:09
    • Release Date 2025/01/17