Companies Home Search Profile

Learn Ethical Hacking & Build Python Attack & Defense Tools

Focused View

Mark Nielsen

4:55:52

128 View
  • 1 - Build A Port Scanner.mp4
    12:01
  • 2 - Build Anonymous FTP Scanner.mp4
    04:47
  • 3 - Build a Network tracker using Wireshark and Google Maps.mp4
    12:12
  • 4 - Build a Zip File Password Cracker.mp4
    08:14
  • 5 - Find Deleted Files Using Python.mp4
    07:07
  • 6 - Brute Force FTP Accounts Using Python.mp4
    08:26
  • 7 - Nmap and Python scripting Information Gathering.mp4
    05:53
  • 8 - Crack Passwords Dictionary Attack.mp4
    05:57
  • 9 - Wireshark Introduction.mp4
    10:37
  • 10 - Wireshark Capture and Protocol Filters.mp4
    06:37
  • 11 - Wireshark TLS Handshake.mp4
    12:40
  • 12 - Wireshark Decrypt TLS Traffic.mp4
    05:19
  • 13 - Capture Wireless Traffic using Monitor Mode.mp4
    05:03
  • 14 - Trace IP Location.mp4
    04:42
  • 15 - Setup DVWA.mp4
    11:45
  • 16 - SQL Injection Part 1.mp4
    08:30
  • 17 - SQL Injection Part 2.mp4
    06:03
  • 18 - Brute Force Burp Suite.mp4
    10:01
  • 19 - CSRF Burp Suite.mp4
    05:53
  • 20 - What is a Honeypot and Why you can use them.mp4
    12:20
  • 21 - CIA Triad.mp4
    04:13
  • 22 - Networking Crash Course OSI TCPIP Protocol Suite.mp4
    02:07:32
  • Description


    Ethical Hacking using Python Hacking tools, Wireshark, and Kali Linux. The full Cybersecurity Expert Path

    What You'll Learn?


    • Intercept network traffic & modify it on the fly.
    • Learn ethical hacking, its fields & the different types of hackers.
    • Develop Python Hacking tools for Offense
    • Install & use Kali Linux - a penetration testing operating system.
    • Develop Python Hacking tools for Defense
    • Python Security
    • How to use Wireshark
    • How to hack web systems using DVWA
    • Computer Networking
    • TCP/IP Protocol suite
    • How to use Burp Suite
    • CIA Triad
    • What a honeypot it

    Who is this for?


  • People interested in learning ethical hacking / penetration testing
  • People interested in learning how hackers hack computer systems
  • People interested in learning how to secure systems from hackers (Ethical Hacking)
  • What You Need to Know?


  • No programming experience is needed however a basis understanding of Python is recommended
  • A computer with access to the Internet
  • More details


    Description

    Welcome to "Learn Ethical Hacking - Build Python Attack & Defense Tools," a comprehensive course that will teach you how to become an ethical hacker and build powerful tools using Python.

    In this course, you'll learn how to think like a hacker and use that knowledge to protect your own systems from attack. You'll explore the different types of attacks, from phishing to denial of service, and learn how to defend against them. You'll also learn how to use Python to create your own custom attack and defense tools.

    This course is designed for anyone who wants to learn ethical hacking and how to use Python to build attack and defense tools. Whether you're a beginner or an experienced programmer, you'll find this course to be informative and engaging.


    Some of the topics covered in this course include:

    • Understanding the basics of ethical hacking

    • The different types of attacks and how to defend against them

    • How to use Python to build custom attack and defense tools

    • Creating a port scanner using Python

    • Developing a password cracker using Python

    • Building a network sniffer using Python

    • Hacking the DVWA using Kali Linux

    • Computer Networking Crash course (OSI TCP/IP Protocol suite)

    By the end of this course, you'll have a strong understanding of ethical hacking and how to use Python to build powerful attack and defense tools. You'll also have the skills and knowledge you need to pursue a career in cybersecurity or advance in your current role.

    Enroll now and take the first step towards becoming an ethical hacker and Python developer.

    Who this course is for:

    • People interested in learning ethical hacking / penetration testing
    • People interested in learning how hackers hack computer systems
    • People interested in learning how to secure systems from hackers (Ethical Hacking)

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mark Nielsen
    Mark Nielsen
    Instructor's Courses
    I hold a Master degree in Computer Science(IT) and have through my years of studying learned how important it is to stay focused and be productive to achieve ones goals. My mission is to teach students around the world how to be more productive, learn faster and have fun while doing it!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 22
    • duration 4:55:52
    • Release Date 2023/06/12