Master Python for Cyber Security: Ultimate 2024 Toolkit
Focused View
10:39:09
01-Description-of-Training.html
02-Video-Overview-(2-22-).mp4
02:22
01-Introduction-(3-03-).mp4
03:03
02-Course-Work-Overview-(1-53-).mp4
01:53
03-Sample-Tool-1---Log-Analyzer-(10-22-).mp4
10:22
04-Sample-Tool-1---Text-Instructions.html
05-Sample-Tool-2---Password-Checker-(7-26-).mp4
07:26
06-Sample-Tool-2---Text-Instructions.html
07-Development-Environment-Overview-(4-33-).mp4
04:33
01-Cyber-Security-Introduction-to-Section-2-(0-45-).mp4
00:45
02-What-is-Cyber-Security-(8-01-).mp4
08:01
03-Explaining-the-methodology-(7-12-).mp4
07:12
04-repl.it-Introduction-(6-33-).mp4
06:33
05-Penetration-Testing---Overview-(5-31-).mp4
05:31
06-Penetration-Testing---Code-Example-(5-27-).mp4
05:27
07-Penetration Testing - Text Instructions.txt
08-Penetration-Testing---Remediation-(8-28-).mp4
08:28
09-Port-Scanning---Overview-(4-29-).mp4
04:29
10-Port-Scanning---Code-Example-(3-38-).mp4
03:38
11-Port Scanning - Text Instructions.txt
12-Port-Scanning---Remediation-(3-51-).mp4
03:51
13-Botnets---Overview-(6-01-).mp4
06:01
14-Botnets---Code-Example-(5-06-).mp4
05:06
15-Botnets---Code-Example-Continued-(5-04-).mp4
05:04
16-Botnets - Text Instructions.txt
17-Botnets---Remediation-(12-15-).mp4
12:15
18-Code-Exploits---Overview-(4-51-).mp4
04:51
19-Code-Exploits---Code-Example-(5-33-).mp4
05:33
20-Code Exploits - Text Instructions.txt
21-Code-Exploits---Remediation-(3-55-).mp4
03:55
22-Forensic-Investigation---Overview-(5-31-).mp4
05:31
23-Forensic-Investigation---Code-Example-(8-29-).mp4
08:29
24-Forensic Investigation - Text Instructions.txt
25-Forensic-Investigation---Remediation-(5-09-).mp4
05:09
26-Network-Traffic-Analysis---Overview-(5-11-).mp4
05:11
27-Network-Traffic-Analysis---Code-Example-(4-28-).mp4
04:28
28-Network Traffic Analysis - Text Instructions.txt
29-Network-Traffic-Analysis---Remediation-(3-43-).mp4
03:43
30-Wireless---Overview-(4-33-).mp4
04:33
31-Wireless---Code-Example-(3-08-).mp4
03:08
32-Wireless - Text Instructions.txt
33-Wireless---Remediation-(9-58-).mp4
09:58
34-Web-Reconnaissance---Overview-(5-31-).mp4
05:31
35-Web-Reconnaissance---Code-Example-(9-36-).mp4
09:36
36-Web Reconnaissance - Text Instructions.txt
37-Web-Reconnaissance---Remediation-(6-30-).mp4
06:30
38-Antivirus-Evasion---Overview-(5-39-).mp4
05:39
39-Antivirus-Evasion---Code-Example-(7-02-).mp4
07:02
40-Antivirus Evasion - Text Instructions.txt
41-Antivirus-Evasion---Remediation-(3-33-).mp4
03:33
42-Social-Engineering---Overview-(6-57-).mp4
06:57
43-Social-Engineering---Code-Example-(4-30-).mp4
04:30
44-Social Engineering - Text Instructions.txt
45-Social-Engineering---Remediation-(2-56-).mp4
02:56
01-Introduction-to-Section-3---Building-your-own-tool-with-Python-(1-15-).mp4
01:15
02-Installing-Python-Locally.html
03-Tool-Development-with-Python---Overview-(4-54-).mp4
04:54
04-Introduction-to-Pip-(3-55-).mp4
03:55
05-Introduction-to-Pip---Text-instructions.html
06-Basic-Python-Script-(3-24-).mp4
03:24
07-Basic-Python-Script---Text-Instructions.html
08-Command-Line-Arguments-(3-16-).mp4
03:16
09-Command-Line-Arguments---Text-Instructions.html
10-Argument-Parsing-(6-29-).mp4
06:29
11-Argument-Parsing---Text-Instructions.html
12-Validating-Input-(3-37-).mp4
03:37
13-Validating-Input---Text-Instructions.html
14-Sending-Requests-to-the-Web-(2-40-).mp4
02:40
15-Sending-Requests-to-the-Web---Text-Instructions.html
16-Parsing-Results-(6-43-).mp4
06:43
17-Parsing-Results---Text-Instructions.html
18-Checking-Forms-(4-31-).mp4
04:31
19-Checking-Forms---Text-Instructions.html
20-Generating-the-Report-(2-19-).mp4
02:19
21-Generating-the-Report---Text-Instructions.html
22-Checking-Comments-(6-32-).mp4
06:32
23-Checking-Comments---Text-Instructions.html
24-Checking-Inputs-(5-12-).mp4
05:12
25-Checking-Inputs---Text-Instructions.html
26-Improving-the-Report-(2-57-).mp4
02:57
27-Improving-the-Report---Text-Instructions.html
28-Configuration-from-File-(3-42-).mp4
03:42
29-Configuration-from-File---Text-Instructions.html
30-Using-Config-Settings-(7-16-).mp4
07:16
31-Using-Config-Settings---Text-Instructions.html
32-Merging-the-Configs-(2-09-).mp4
02:09
33-Merging-the-Configs---Text-Instructions.html
34-Outputting-the-Report-(8-36-).mp4
08:36
35-Outputting-the-Report---Text-Instructions.html
36-Pushing-to-GitHub-(4-29-).mp4
04:29
37-Pushing-to-GitHub---Text-Instructions.html
38-Testing-the-Tool-(6-05-).mp4
06:05
39-Writing-the-Documentation-(6-24-).mp4
06:24
40-Distributing-Your-Tool-(5-48-).mp4
05:48
01-Section-4-Introduction-(1-17-).mp4
01:17
02-Web-Application-Security-Introduction-(6-00-).mp4
06:00
03-OWASP-Overview-(4-37-).mp4
04:37
04-Introduction-to-the-OWASP-Top-10-(1-27-).mp4
01:27
05-Rails-Overview-(3-14-).mp4
03:15
06-PHP-Overview-(5-08-).mp4
05:08
07-Installing-Rails-and-PHP.html
08-OWASP-Top-10-Vulnerabilities-Example-Code---Where-to-get-it.html
09-Command-Injection---Overview-(4-48-).mp4
04:48
10-Command-Injection---Rails-Example-(6-44-).mp4
06:44
11-Command-Injection---Rails-example---Text-Instructions.html
12-Command-Injection---PHP-Example-(4-10-).mp4
04:10
13-Command-Injection---PHP-example---Text-Instructions.html
14-SQL-Injection---Overview-(6-25-).mp4
06:25
15-SQL-Injection---Rails-Example-(3-59-).mp4
03:59
16-SQL-Injection---Rails-example---Text-Instructions.html
17-SQL-Injection---PHP-Example-(3-31-).mp4
03:31
18-SQL-Injection-Remediation---PHP-Example-(2-26-).mp4
02:26
19-SQL-Injection---PHP-example---Text-Instructions.html
20-Password-Complexity---Overview-(6-46-).mp4
06:47
21-Password-Complexity---Rails-Example-(6-50-).mp4
06:50
22-Password-Complexity---Rails-example---Text-Instructions.html
23-Password-Complexity---PHP-Example-(6-28-).mp4
06:28
24-Password-Complexity---PHP-example---Text-Instructions.html
25-Information-Leakage---Overview-(4-56-).mp4
04:56
26-Information-Leakage---Rails-Example-(3-07-).mp4
03:07
27-Information-Leakage---Rails-example---Text-Instructions.html
28-Information-Leakage---PHP-Example-(7-13-).mp4
07:13
29-Information-Leakage---PHP-example---Text-Instructions.html
30-Sensitive-Data-Exposure---Overview-(4-53-).mp4
04:53
31-Sensitive-Data-Exposure---Rails-Example-(4-23-).mp4
04:23
32-Sensitive-Data-Exposure---Rails-example---Text-Instructions.html
33-Sensitive-Data-Exposure---PHP-Example-(2-54-).mp4
02:54
34-Sensitive-Data-Exposure---PHP-example---Text-Instructions.html
35-XML-External-Entities-(XXE)---Overview-(4-40-).mp4
04:40
36-XML-External-Entities-(XXE)---Rails-Example-(4-36-).mp4
04:36
37-XML-External-Entities-(XXE)---Rails-example---Text-Instructions.html
38-XML-External-Entities-(XXE)---PHP-Example-(4-28-).mp4
04:28
39-XML-External-Entities-(XXE)---PHP-example---Text-Instructions.html
40-Broken-Access-Control---Overview-(5-12-).mp4
05:12
41-Broken-Access-Control---Rails-Example-(11-56-).mp4
11:56
42-Broken-Access-Control---Rails-example---Text-Instructions.html
43-Broken-Access-Control---PHP-Example-(3-39-).mp4
03:39
44-Broken-Access-Control---PHP-example---Text-Instructions.html
45-Security-Misconfiguration---Overview-(5-50-).mp4
05:50
46-Security-Misconfiguration---Rails-Example-(3-46-).mp4
03:46
47-Security-Misconfiguration---Rails-example---Text-Instructions.html
48-Security-Misconfiguration---PHP-Example-(3-28-).mp4
03:28
49-Security-Misconfiguration---PHP-example---Text-Instructions.html
50-Cross-Site-Scripting-(XSS)---Overview-(1-34-).mp4
01:34
51-Cross-Site-Scripting-(XSS)---Rails-Example-(5-09-).mp4
05:09
52-Cross-Site-Scripting-(XSS)---Rails-example---Text-Instructions.html
53-Cross-Site-Scripting-(XSS)---PHP-Example-(5-50-).mp4
05:50
54-Cross-Site-Scripting-(XSS)---PHP-example---Text-Instructions.html
55-Insecure-Deserialization---Overview-(3-46-).mp4
03:46
56-Insecure-Deserialization---Rails-Example-(5-18-).mp4
05:18
57-Insecure-Deserialization---Rails-example---Text-Instructions.html
58-Insecure-Deserialization---PHP-Example-(7-22-).mp4
07:22
59-Insecure-Deserialization---PHP-example---Text-Instructions.html
60-Using-Components-with-Known-Vulnerabilities---Overview-(5-28-).mp4
05:28
61-Using-Components-with-Known-Vulnerabilities---Rails-Example-(11-01-).mp4
11:01
62-Using-Components-with-Known-Vulnerabilities---Rails-example---Text-Instructions.html
63-Using-Components-with-Known-Vulnerabilities---PHP-Example-(4-38-).mp4
04:38
64-Using-Components-with-Known-Vulnerabilities---PHP-example---Text-Instructions.html
65-Insufficient-Logging-and-Monitoring---Overview-(4-06-).mp4
04:06
66-Insufficient-Logging-Monitoring---Rails-example-(5-49-).mp4
05:49
67-Insufficient-Logging-and-Monitoring---Rails-Example---Text-Instructions.html
68-Insufficient-Logging-Monitoring---PHP-example-(6-14-).mp4
06:14
69-Insufficient-Logging-and-Monitoring---PHP-Example---Text-Instructions.html
70-Web-Security-Analysis-Tool-(9-17-).mp4
09:17
01-Multi-Factor-Authentication-(16-35-).mp4
16:35
02-Ethical-Hacking-(5-08-).mp4
05:08
03-Password-Complexity-(11-18-).mp4
11:18
04-Physical-Security-(10-31-).mp4
10:31
05-Data-Breaches-(9-34-).mp4
09:34
06-Cloud-Security-(11-44-).mp4
11:44
01-Password-Encryption-Tool-Introduction-(0-56-).mp4
00:56
02-Password-Encryption-Overview-(2-35-).mp4
02:35
03-Creating-the-Tool-(2-48-).mp4
02:48
04-Command-Line-Arguments-(4-15-).mp4
04:15
05-Adding-Encryption-(4-45-).mp4
04:45
06-Check-If-Encryption-Works-(2-32-).mp4
02:32
07-Password-Encryption-Tool---Source-Code.html
01-Installation-and-expectations.html
02-Strings.html
03-Numbers.html
04-Lists,-Tuples,-Sets.html
05-Dictionaries.html
06-Branching-and-Functions-Methods.html
07-Standard-library-and-imports.html
08-Object-Oriented-Programming--Classes.html
01-Thank-You!-(1-07-).mp4
01:07
02-Appendix-A--Acknowledgements.html
03-Appendix-B--Glossary.html
More details
Course Overview
This comprehensive course teaches you to build security tools with Python while protecting systems against modern cyber threats. Perfect for beginners, it includes hands-on projects covering vulnerability analysis, web app security, and penetration testing techniques.
What You'll Learn
- Build Python tools for security analysis and penetration testing
- Protect web applications against OWASP Top 10 vulnerabilities
- Analyze network traffic, detect threats, and implement security remediations
Who This Is For
- Beginners in cyber security looking for practical Python skills
- IT professionals transitioning to security roles
- Developers wanting to build secure web applications
Key Benefits
- No prior programming experience required - includes Python crash course
- Hands-on projects with log analyzers, password checkers, and forensic tools
- Covers both offensive security techniques and defensive strategies
Curriculum Highlights
- Cyber Security Fundamentals & Python Tool Building
- Web Application Security & OWASP Vulnerabilities
- Advanced Topics: Ethical Hacking, Cloud Security & Data Breaches
Focused display
Category
- language english
- Training sessions 120
- duration 10:39:09
- Release Date 2025/05/18