Home Search Profile

Master Python for Cyber Security: Ultimate 2024 Toolkit

Focused View

10:39:09

  • 01-Description-of-Training.html
  • 02-Video-Overview-(2-22-).mp4
    02:22
  • 01-Introduction-(3-03-).mp4
    03:03
  • 02-Course-Work-Overview-(1-53-).mp4
    01:53
  • 03-Sample-Tool-1---Log-Analyzer-(10-22-).mp4
    10:22
  • 04-Sample-Tool-1---Text-Instructions.html
  • 05-Sample-Tool-2---Password-Checker-(7-26-).mp4
    07:26
  • 06-Sample-Tool-2---Text-Instructions.html
  • 07-Development-Environment-Overview-(4-33-).mp4
    04:33
  • 01-Cyber-Security-Introduction-to-Section-2-(0-45-).mp4
    00:45
  • 02-What-is-Cyber-Security-(8-01-).mp4
    08:01
  • 03-Explaining-the-methodology-(7-12-).mp4
    07:12
  • 04-repl.it-Introduction-(6-33-).mp4
    06:33
  • 05-Penetration-Testing---Overview-(5-31-).mp4
    05:31
  • 06-Penetration-Testing---Code-Example-(5-27-).mp4
    05:27
  • 07-Penetration Testing - Text Instructions.txt
  • 08-Penetration-Testing---Remediation-(8-28-).mp4
    08:28
  • 09-Port-Scanning---Overview-(4-29-).mp4
    04:29
  • 10-Port-Scanning---Code-Example-(3-38-).mp4
    03:38
  • 11-Port Scanning - Text Instructions.txt
  • 12-Port-Scanning---Remediation-(3-51-).mp4
    03:51
  • 13-Botnets---Overview-(6-01-).mp4
    06:01
  • 14-Botnets---Code-Example-(5-06-).mp4
    05:06
  • 15-Botnets---Code-Example-Continued-(5-04-).mp4
    05:04
  • 16-Botnets - Text Instructions.txt
  • 17-Botnets---Remediation-(12-15-).mp4
    12:15
  • 18-Code-Exploits---Overview-(4-51-).mp4
    04:51
  • 19-Code-Exploits---Code-Example-(5-33-).mp4
    05:33
  • 20-Code Exploits - Text Instructions.txt
  • 21-Code-Exploits---Remediation-(3-55-).mp4
    03:55
  • 22-Forensic-Investigation---Overview-(5-31-).mp4
    05:31
  • 23-Forensic-Investigation---Code-Example-(8-29-).mp4
    08:29
  • 24-Forensic Investigation - Text Instructions.txt
  • 25-Forensic-Investigation---Remediation-(5-09-).mp4
    05:09
  • 26-Network-Traffic-Analysis---Overview-(5-11-).mp4
    05:11
  • 27-Network-Traffic-Analysis---Code-Example-(4-28-).mp4
    04:28
  • 28-Network Traffic Analysis - Text Instructions.txt
  • 29-Network-Traffic-Analysis---Remediation-(3-43-).mp4
    03:43
  • 30-Wireless---Overview-(4-33-).mp4
    04:33
  • 31-Wireless---Code-Example-(3-08-).mp4
    03:08
  • 32-Wireless - Text Instructions.txt
  • 33-Wireless---Remediation-(9-58-).mp4
    09:58
  • 34-Web-Reconnaissance---Overview-(5-31-).mp4
    05:31
  • 35-Web-Reconnaissance---Code-Example-(9-36-).mp4
    09:36
  • 36-Web Reconnaissance - Text Instructions.txt
  • 37-Web-Reconnaissance---Remediation-(6-30-).mp4
    06:30
  • 38-Antivirus-Evasion---Overview-(5-39-).mp4
    05:39
  • 39-Antivirus-Evasion---Code-Example-(7-02-).mp4
    07:02
  • 40-Antivirus Evasion - Text Instructions.txt
  • 41-Antivirus-Evasion---Remediation-(3-33-).mp4
    03:33
  • 42-Social-Engineering---Overview-(6-57-).mp4
    06:57
  • 43-Social-Engineering---Code-Example-(4-30-).mp4
    04:30
  • 44-Social Engineering - Text Instructions.txt
  • 45-Social-Engineering---Remediation-(2-56-).mp4
    02:56
  • 01-Introduction-to-Section-3---Building-your-own-tool-with-Python-(1-15-).mp4
    01:15
  • 02-Installing-Python-Locally.html
  • 03-Tool-Development-with-Python---Overview-(4-54-).mp4
    04:54
  • 04-Introduction-to-Pip-(3-55-).mp4
    03:55
  • 05-Introduction-to-Pip---Text-instructions.html
  • 06-Basic-Python-Script-(3-24-).mp4
    03:24
  • 07-Basic-Python-Script---Text-Instructions.html
  • 08-Command-Line-Arguments-(3-16-).mp4
    03:16
  • 09-Command-Line-Arguments---Text-Instructions.html
  • 10-Argument-Parsing-(6-29-).mp4
    06:29
  • 11-Argument-Parsing---Text-Instructions.html
  • 12-Validating-Input-(3-37-).mp4
    03:37
  • 13-Validating-Input---Text-Instructions.html
  • 14-Sending-Requests-to-the-Web-(2-40-).mp4
    02:40
  • 15-Sending-Requests-to-the-Web---Text-Instructions.html
  • 16-Parsing-Results-(6-43-).mp4
    06:43
  • 17-Parsing-Results---Text-Instructions.html
  • 18-Checking-Forms-(4-31-).mp4
    04:31
  • 19-Checking-Forms---Text-Instructions.html
  • 20-Generating-the-Report-(2-19-).mp4
    02:19
  • 21-Generating-the-Report---Text-Instructions.html
  • 22-Checking-Comments-(6-32-).mp4
    06:32
  • 23-Checking-Comments---Text-Instructions.html
  • 24-Checking-Inputs-(5-12-).mp4
    05:12
  • 25-Checking-Inputs---Text-Instructions.html
  • 26-Improving-the-Report-(2-57-).mp4
    02:57
  • 27-Improving-the-Report---Text-Instructions.html
  • 28-Configuration-from-File-(3-42-).mp4
    03:42
  • 29-Configuration-from-File---Text-Instructions.html
  • 30-Using-Config-Settings-(7-16-).mp4
    07:16
  • 31-Using-Config-Settings---Text-Instructions.html
  • 32-Merging-the-Configs-(2-09-).mp4
    02:09
  • 33-Merging-the-Configs---Text-Instructions.html
  • 34-Outputting-the-Report-(8-36-).mp4
    08:36
  • 35-Outputting-the-Report---Text-Instructions.html
  • 36-Pushing-to-GitHub-(4-29-).mp4
    04:29
  • 37-Pushing-to-GitHub---Text-Instructions.html
  • 38-Testing-the-Tool-(6-05-).mp4
    06:05
  • 39-Writing-the-Documentation-(6-24-).mp4
    06:24
  • 40-Distributing-Your-Tool-(5-48-).mp4
    05:48
  • 01-Section-4-Introduction-(1-17-).mp4
    01:17
  • 02-Web-Application-Security-Introduction-(6-00-).mp4
    06:00
  • 03-OWASP-Overview-(4-37-).mp4
    04:37
  • 04-Introduction-to-the-OWASP-Top-10-(1-27-).mp4
    01:27
  • 05-Rails-Overview-(3-14-).mp4
    03:15
  • 06-PHP-Overview-(5-08-).mp4
    05:08
  • 07-Installing-Rails-and-PHP.html
  • 08-OWASP-Top-10-Vulnerabilities-Example-Code---Where-to-get-it.html
  • 09-Command-Injection---Overview-(4-48-).mp4
    04:48
  • 10-Command-Injection---Rails-Example-(6-44-).mp4
    06:44
  • 11-Command-Injection---Rails-example---Text-Instructions.html
  • 12-Command-Injection---PHP-Example-(4-10-).mp4
    04:10
  • 13-Command-Injection---PHP-example---Text-Instructions.html
  • 14-SQL-Injection---Overview-(6-25-).mp4
    06:25
  • 15-SQL-Injection---Rails-Example-(3-59-).mp4
    03:59
  • 16-SQL-Injection---Rails-example---Text-Instructions.html
  • 17-SQL-Injection---PHP-Example-(3-31-).mp4
    03:31
  • 18-SQL-Injection-Remediation---PHP-Example-(2-26-).mp4
    02:26
  • 19-SQL-Injection---PHP-example---Text-Instructions.html
  • 20-Password-Complexity---Overview-(6-46-).mp4
    06:47
  • 21-Password-Complexity---Rails-Example-(6-50-).mp4
    06:50
  • 22-Password-Complexity---Rails-example---Text-Instructions.html
  • 23-Password-Complexity---PHP-Example-(6-28-).mp4
    06:28
  • 24-Password-Complexity---PHP-example---Text-Instructions.html
  • 25-Information-Leakage---Overview-(4-56-).mp4
    04:56
  • 26-Information-Leakage---Rails-Example-(3-07-).mp4
    03:07
  • 27-Information-Leakage---Rails-example---Text-Instructions.html
  • 28-Information-Leakage---PHP-Example-(7-13-).mp4
    07:13
  • 29-Information-Leakage---PHP-example---Text-Instructions.html
  • 30-Sensitive-Data-Exposure---Overview-(4-53-).mp4
    04:53
  • 31-Sensitive-Data-Exposure---Rails-Example-(4-23-).mp4
    04:23
  • 32-Sensitive-Data-Exposure---Rails-example---Text-Instructions.html
  • 33-Sensitive-Data-Exposure---PHP-Example-(2-54-).mp4
    02:54
  • 34-Sensitive-Data-Exposure---PHP-example---Text-Instructions.html
  • 35-XML-External-Entities-(XXE)---Overview-(4-40-).mp4
    04:40
  • 36-XML-External-Entities-(XXE)---Rails-Example-(4-36-).mp4
    04:36
  • 37-XML-External-Entities-(XXE)---Rails-example---Text-Instructions.html
  • 38-XML-External-Entities-(XXE)---PHP-Example-(4-28-).mp4
    04:28
  • 39-XML-External-Entities-(XXE)---PHP-example---Text-Instructions.html
  • 40-Broken-Access-Control---Overview-(5-12-).mp4
    05:12
  • 41-Broken-Access-Control---Rails-Example-(11-56-).mp4
    11:56
  • 42-Broken-Access-Control---Rails-example---Text-Instructions.html
  • 43-Broken-Access-Control---PHP-Example-(3-39-).mp4
    03:39
  • 44-Broken-Access-Control---PHP-example---Text-Instructions.html
  • 45-Security-Misconfiguration---Overview-(5-50-).mp4
    05:50
  • 46-Security-Misconfiguration---Rails-Example-(3-46-).mp4
    03:46
  • 47-Security-Misconfiguration---Rails-example---Text-Instructions.html
  • 48-Security-Misconfiguration---PHP-Example-(3-28-).mp4
    03:28
  • 49-Security-Misconfiguration---PHP-example---Text-Instructions.html
  • 50-Cross-Site-Scripting-(XSS)---Overview-(1-34-).mp4
    01:34
  • 51-Cross-Site-Scripting-(XSS)---Rails-Example-(5-09-).mp4
    05:09
  • 52-Cross-Site-Scripting-(XSS)---Rails-example---Text-Instructions.html
  • 53-Cross-Site-Scripting-(XSS)---PHP-Example-(5-50-).mp4
    05:50
  • 54-Cross-Site-Scripting-(XSS)---PHP-example---Text-Instructions.html
  • 55-Insecure-Deserialization---Overview-(3-46-).mp4
    03:46
  • 56-Insecure-Deserialization---Rails-Example-(5-18-).mp4
    05:18
  • 57-Insecure-Deserialization---Rails-example---Text-Instructions.html
  • 58-Insecure-Deserialization---PHP-Example-(7-22-).mp4
    07:22
  • 59-Insecure-Deserialization---PHP-example---Text-Instructions.html
  • 60-Using-Components-with-Known-Vulnerabilities---Overview-(5-28-).mp4
    05:28
  • 61-Using-Components-with-Known-Vulnerabilities---Rails-Example-(11-01-).mp4
    11:01
  • 62-Using-Components-with-Known-Vulnerabilities---Rails-example---Text-Instructions.html
  • 63-Using-Components-with-Known-Vulnerabilities---PHP-Example-(4-38-).mp4
    04:38
  • 64-Using-Components-with-Known-Vulnerabilities---PHP-example---Text-Instructions.html
  • 65-Insufficient-Logging-and-Monitoring---Overview-(4-06-).mp4
    04:06
  • 66-Insufficient-Logging-Monitoring---Rails-example-(5-49-).mp4
    05:49
  • 67-Insufficient-Logging-and-Monitoring---Rails-Example---Text-Instructions.html
  • 68-Insufficient-Logging-Monitoring---PHP-example-(6-14-).mp4
    06:14
  • 69-Insufficient-Logging-and-Monitoring---PHP-Example---Text-Instructions.html
  • 70-Web-Security-Analysis-Tool-(9-17-).mp4
    09:17
  • 01-Multi-Factor-Authentication-(16-35-).mp4
    16:35
  • 02-Ethical-Hacking-(5-08-).mp4
    05:08
  • 03-Password-Complexity-(11-18-).mp4
    11:18
  • 04-Physical-Security-(10-31-).mp4
    10:31
  • 05-Data-Breaches-(9-34-).mp4
    09:34
  • 06-Cloud-Security-(11-44-).mp4
    11:44
  • 01-Password-Encryption-Tool-Introduction-(0-56-).mp4
    00:56
  • 02-Password-Encryption-Overview-(2-35-).mp4
    02:35
  • 03-Creating-the-Tool-(2-48-).mp4
    02:48
  • 04-Command-Line-Arguments-(4-15-).mp4
    04:15
  • 05-Adding-Encryption-(4-45-).mp4
    04:45
  • 06-Check-If-Encryption-Works-(2-32-).mp4
    02:32
  • 07-Password-Encryption-Tool---Source-Code.html
  • 01-Installation-and-expectations.html
  • 02-Strings.html
  • 03-Numbers.html
  • 04-Lists,-Tuples,-Sets.html
  • 05-Dictionaries.html
  • 06-Branching-and-Functions-Methods.html
  • 07-Standard-library-and-imports.html
  • 08-Object-Oriented-Programming--Classes.html
  • 01-Thank-You!-(1-07-).mp4
    01:07
  • 02-Appendix-A--Acknowledgements.html
  • 03-Appendix-B--Glossary.html
  • More details


    Course Overview

    This comprehensive course teaches you to build security tools with Python while protecting systems against modern cyber threats. Perfect for beginners, it includes hands-on projects covering vulnerability analysis, web app security, and penetration testing techniques.

    What You'll Learn

    • Build Python tools for security analysis and penetration testing
    • Protect web applications against OWASP Top 10 vulnerabilities
    • Analyze network traffic, detect threats, and implement security remediations

    Who This Is For

    • Beginners in cyber security looking for practical Python skills
    • IT professionals transitioning to security roles
    • Developers wanting to build secure web applications

    Key Benefits

    • No prior programming experience required - includes Python crash course
    • Hands-on projects with log analyzers, password checkers, and forensic tools
    • Covers both offensive security techniques and defensive strategies

    Curriculum Highlights

    1. Cyber Security Fundamentals & Python Tool Building
    2. Web Application Security & OWASP Vulnerabilities
    3. Advanced Topics: Ethical Hacking, Cloud Security & Data Breaches
    Focused display
    • language english
    • Training sessions 120
    • duration 10:39:09
    • Release Date 2025/05/18

    Courses related to Python

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness