Companies Home Search Profile

Python for Automating Information Security

Focused View

Thomas McNeela

2:38:28

15 View
  • 01-The Course Overview.mp4
    05:02
  • 02-Setting Up Your Virtual Environment.mp4
    03:19
  • 03-Finding an Exploit Script.mp4
    02:02
  • 04-Understanding the Script.mp4
    02:51
  • 05-Modifying the Script.mp4
    04:49
  • 06-Testing the Script.mp4
    03:16
  • 07-Viewing a Packet Capture File in Wireshark.mp4
    05:07
  • 08-Understanding Normal Traffic Patterns.mp4
    04:44
  • 09-Writing a Python Script to Look for Malicious Network Traffic.mp4
    04:47
  • 10-Writing a Python Script to Calculate a Network Traffic Baseline.mp4
    04:52
  • 11-Writing a Python Script to Compare a Baseline Against Network Traffic.mp4
    04:48
  • 12-What OSINT Is.mp4
    05:12
  • 13-Enumerating Domain Names with Python.mp4
    03:56
  • 14-What Is Google Dorking.mp4
    03:16
  • 15-Automating Google Dorking with Python.mp4
    03:27
  • 16-Web Directory Enumeration with Python.mp4
    03:24
  • 17-Reading a Log File.mp4
    04:39
  • 18-Understanding Normal Log Messages.mp4
    04:22
  • 19-Writing a Python Script to Look for Logs Indicating Malicious Activity.mp4
    04:49
  • 20-Writing a Python Script to Calculate a Log Message Baseline.mp4
    04:50
  • 21-Writing a Python Script to Compare a Baseline Against a Log File.mp4
    03:58
  • 22-What Is Netcat.mp4
    05:10
  • 23-Writing the Input Arguments.mp4
    05:24
  • 24-Writing the Client.mp4
    03:47
  • 25-Writing the Server.mp4
    04:43
  • 26-Testing Your Program.mp4
    04:45
  • 27-Introduction to Passive Network Capture.mp4
    04:27
  • 28-Writing a Python Packet Sniffer.mp4
    04:12
  • 29-Capturing Plain-Text Credentials from Network Packets with Python.mp4
    04:16
  • 30-Introduction to ARP Cache Poisoning.mp4
    03:49
  • 31-Writing a Python ARP Cache Poisoner.mp4
    05:02
  • 32-Introduction to the Metasploit Framework.mp4
    05:46
  • 33-Writing the Discovery Module.mp4
    04:19
  • 34-Writing the Exploit Framework.mp4
    05:13
  • 35-Stitching It All Together with an Interactive Command Shell.mp4
    05:41
  • 36-Testing MSFPY.mp4
    04:24
  • Description


    The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data. In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own! By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world. All the code and supporting files for this course are available on GitHub at: https://github.com/PacktPublishing/Python-for-Automating-Information-Security

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Thomas McNeela
    Thomas McNeela
    Instructor's Courses
    Thomas McNeela is an experienced information security professional and continuing-education instructor. Over his nine-year career, he has worked for several companies including Motorola Mobility and U.S. Cellular. Thomas specializes in network engineering and security, security assessments, threat intelligence, and automation. He earned a Master of Science (M.S.) degree in Information Systems from Northwestern University and holds many industry-recognized certifications including the CISSP and CEH (Master), and is currently working for information security software and services firm located in the Chicago area.
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 36
    • duration 2:38:28
    • Release Date 2024/03/15