4.63 out of 5
4.63
8 reviews on Udemy

Learn Ethical Hacking & Build Python Attack & Defense Tools

Ethical Hacking using Python Hacking tools, Wireshark, and Kali Linux. The full Cybersecurity Expert Path
Instructor:
Mark Nielsen
34 students enrolled
English [Auto]
Intercept network traffic & modify it on the fly.
Learn ethical hacking, its fields & the different types of hackers.
Develop Python Hacking tools for Offense
Install & use Kali Linux - a penetration testing operating system.
Develop Python Hacking tools for Defense
Python Security
How to use Wireshark
How to hack web systems using DVWA
Computer Networking
TCP/IP Protocol suite
How to use Burp Suite
CIA Triad
What a honeypot it

Welcome to “Learn Ethical Hacking – Build Python Attack & Defense Tools,” a comprehensive course that will teach you how to become an ethical hacker and build powerful tools using Python.

In this course, you’ll learn how to think like a hacker and use that knowledge to protect your own systems from attack. You’ll explore the different types of attacks, from phishing to denial of service, and learn how to defend against them. You’ll also learn how to use Python to create your own custom attack and defense tools.

This course is designed for anyone who wants to learn ethical hacking and how to use Python to build attack and defense tools. Whether you’re a beginner or an experienced programmer, you’ll find this course to be informative and engaging.

Some of the topics covered in this course include:

  • Understanding the basics of ethical hacking

  • The different types of attacks and how to defend against them

  • How to use Python to build custom attack and defense tools

  • Creating a port scanner using Python

  • Developing a password cracker using Python

  • Building a network sniffer using Python

  • Hacking the DVWA using Kali Linux

  • Computer Networking Crash course (OSI TCP/IP Protocol suite)

By the end of this course, you’ll have a strong understanding of ethical hacking and how to use Python to build powerful attack and defense tools. You’ll also have the skills and knowledge you need to pursue a career in cybersecurity or advance in your current role.

Enroll now and take the first step towards becoming an ethical hacker and Python developer.

Build Your Own Python Hacking Tools

1
Build A Port Scanner
2
Build Anonymous FTP Scanner
3
Build a Network tracker using Wireshark and Google Maps
4
Build a Zip File Password Cracker
5
Find Deleted Files Using Python
6
Brute Force FTP Accounts Using Python
7
Nmap and Python scripting (Information Gathering)
8
Crack Passwords (Dictionary Attack)
9
Submit your Port Scanner

Network Analysis Using Wireshark

1
Wireshark Introduction
2
Wireshark (Capture and Protocol Filters)
3
Wireshark TLS Handshake
4
Wireshark (Decrypt TLS Traffic)
5
Capture Wireless Traffic using Monitor Mode
6
Trace IP Location
7
Analyse your network

Hack a Web Application using Kali Linux

1
Setup DVWA
2
SQL Injection Part 1
3
SQL Injection Part 2
4
Brute Force (Burp Suite)
5
CSRF (Burp Suite)
6
Stored XSS
7
Reflected XSS

Networking & Honeypots

1
What is a Honeypot? and Why you can use them
2
CIA Triad
3
Networking Crash Course (OSI & TCP/IP Protocol Suite)
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4.6
4.6 out of 5
8 Ratings

Detailed Rating

Stars 5
4
Stars 4
4
Stars 3
0
Stars 2
0
Stars 1
0