Python For Penetration

About Course
Unlock the power of Python and become a cybersecurity expert with our “Python for Penetration” course! This comprehensive program is designed for ethical hackers, cybersecurity enthusiasts, and IT professionals who want to elevate their skills by leveraging Python for penetration testing and security analysis.
Course Content
Python For Penetration
-
Course Intro
07:34 -
1.1 Introduction To Python
07:34 -
1.2 Getting started-01
11:25 -
1.3 Variables And Data Types Part 1
12:23 -
1.4 Variables And Data Types Part 2
13:38 -
1.5 Conditional Statements And Loops Part 1
06:58 -
1.6 Conditional Statements And Loops Part 2
09:30 -
1.7 Conditional Statements And Loops Part 3
12:32 -
1.8 Functions in Python
11:25 -
1.9 Exceptional Handing in Python
10:43 -
2.1 Classes And Objects
14:46 -
2.2 Inheritance
09:18 -
2.3 Creating Own Modules
08:38 -
2.4 File Handing
12:28 -
2.5 Multithreading
09:56 -
2.6 Threading And Queues
11:56 -
2.7 Multiprocessing
-
2.8 Subprocess
10:56 -
2.9 Py_to_exe-01
08:34 -
3.01 Introduction To Sockets TCP And UDP
07:50 -
3 02 Simple TCP Socket Server Part 1
08:53 -
3 03 Simple TCP Socket Server Part 2
07:27 -
3 04 Simple Tcp Client
04:34 -
3 05 Multithreaded TCP Server
10:35 -
3 06 Socket Server Framework
10:41 -
3 07 Introduction To Raw Sockets
06:54 -
3 08 Packet Sniffing With Raw Sockets
14:56 -
3 09 Packet Injection With Raw Sockets
10:56 -
3 10 Packet Sniffing With Scapy
13:30 -
3 11 Packet Injection With Scapy
12:39 -
3 12 Writing Programs in Python With Scapy
07:26 -
4 1 Fetching Webpages
14:54 -
4 2 Parsing HTML Using Beautiful Soup
08:31 -
4 3 Creating Own Web Scapper
10:24 -
4 4 HTML Authentication Bruteforce
12:58 -
4 5 HTML Authentication Bruteforce continue
06:09 -
4 6 Bruteforcing Web DirecTories And Files
10:06 -
4 7 0WASP And CTFs For Practicing
14:28 -
5 1 SSH With Paramiko
08:59 -
5 2 SSH Bruteforcing Using Paramiko
09:40 -
5 3 SSH Tunneling
13:06 -
5 4 SFTP With Paramiko
08:43 -
5 5 Using Nmap Inside Python
10:19 -
6 1 Creating Botnets in Python
12:37 -
6 2 Creating A Keylogger in Python
06:12 -
6 3 Reverse Shell
13:36 -
6 4 Python Based Ransomware
14:03 -
6 5 Python Based Ransomware Part 2
08:22
Student Ratings & Reviews
No Review Yet