Топ-100 | Обзор | Комменты | Новости | RSS RSS | Поиск | Хочу! | Добавить ссылки | О сайте | FAQ | Профиль
RapidLinks - Скачай всё!
  


Python For Ethical Hackers And Cyber Security Engineers

Python For Ethical Hackers And Cyber Security Engineers



ВидеоВидео Рейтинг публикации: 0 (голосов: 0)  
https://i125.fastpic.org/big/2025/0407/26/e088834e1bce6bcf8396649edf2d5f26.jpg
Python For Ethical Hackers And Cyber Security Engineers
Published 7/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.91 GB | Duration: 4h 30m

Become an Ethical Hacker and Cyber Security Analyst, and build your own hacking tools using Python Scripting

What you'll learn

Python scripting and Ethical hacking

Write your own hacking tools using python

Build a strong foundation in networking protocols

Build a strong foundation in cryptography

Learn the OSI model, data encapsulation and how network packets are constructed and transferred from one machine to another

Write you own python script to spoof your MAC address

Dive Deep into ARP protocol and build a network scanner to discover live hosts

Acquire a comprehensive understanding of the IP and ICMP protocol

Lean how to build your own hacking tool to trace route an IP address

Learn the TCP protocol, how an connection is established during a TCP handshake and the type of TCP packets

Dive Deep into TCP port Scanning techniques like SYN_SCAN, ACK_SCAN and FIN_SCAN

Write a python script to scan TCP ports

Lean data encoding, hashing and encryption

Build a password cracker in python, to retrieve a password from a given hashing

build your hacking tool to encrypt and decrypt data using AES algorithm

Implement an Hybrid Encryption in python, by generating an RSA private and public keys and encrypting the AES session Key

Learn the fundamentals about Bind Shell and Reverse Shell

write your own Bind Shell in python language

write your own reverse Shell in python language

Requirements

No programming experience or cyber security knowledge is required

Basic IT knowledge in computer systems

Description

This course is focused on learning by doing. In this course you will learn both Ethical Hacking and Programming at the same time. First you learn the basic theoretical knowledge about a given topic, then you apply this knowledge by building a hacking tool using python scripting.On this course we will focus on the following topics, networking, shell terminals and cryptography.1- We dive into details about the OSI model, data encapsulation and how network packets are constructed and exchanged between different hosts.2- We learn how data is exchanged using both the MAC address and the IP address.3- We write a python script that will spoof our MAC address.4- We learn the inner working of the ARP protocol and we apply that knowledge by writing a network scanner using python scripting. A network scanner will discover all live hosts inside our local network using ARP Requests and Replies.5- We dive into details about IP protocol and ICMP protocol, and we apply this theoretical knowledge by writing a python script that will trace route an IP address and discover all the routers in the path to the target IP address.6- We build the required knowledge about TCP protocol, how a connection is made during TCP handshake, and how to scan a target host to discover its open ports using TCP port scanning techniques. We write a python script to scan for open ports using TCP_SYN_SCAN, TCP_ACK_SCAN, TCP_FIN_SCAN.7- We learn how to connect to a target machine and get a shell terminal to execute commands on this target machine, using BIND SHELL and REVERSE SHELL. We write a BIND SHELL and REVERSE SHELL using python scripting.8- We learn the fundamentals skills about Cryptography, like Data Encoding, Data Hashing, Data Encryption/Decryption, and Password Hash Cracking.9- We apply the theoretical knowledge about Cryptography by implementing an Hybrid Encryption in Python using RSA Asymmetric Encryption and AES Symmetric Encryption.10- We write a Password Hash Cracking Tool using Python Scripting.

Overview

Section 1: Introduction

Lecture 1 Python For Ethical Hackers and Cyber Security Engineers Introduction

Lecture 2 Networking fundamentals

Lecture 3 OSI Model

Lecture 4 Data Encapsulation

Lecture 5 Packet Flow

Section 2: Building a network scanner in Python and hacking the ARP Protocol

Lecture 6 A deep dive inside the ARP protocol

Lecture 7 ARP Scan and Man In The Middle Attack

Lecture 8 A deep dive inside the Ethernet frame

Lecture 9 Hacking the ARP Header

Lecture 10 Spoofing our MAC address using python

Lecture 11 Scanning the network and discovering live hosts using python

Section 3: Trace route an IP Address using python and hacking the IP & ICMP Protocols

Lecture 12 Deep Dive inside the IP Protocol - Part 1

Lecture 13 Deep Dive inside the IP Protocol - Part 2

Lecture 14 Deep Dive inside the IP Protocol - Part 3

Lecture 15 Deep Dive inside the ICMP Protocol - Part 1

Lecture 16 Deep Dive inside the ICMP Protocol - Part 2

Lecture 17 Trace routing an IP Address using python - Part 1

Lecture 18 Trace routing an IP Address using python - Part 2

Lecture 19 Trace routing an IP Address using python - Part 3

Section 4: Discovering open ports using python and hacking the TCP Protocol

Lecture 20 Introduction to TCP Protocol

Lecture 21 TCP Handshake in details

Lecture 22 TCP Port Scanning Techniques - Part 1

Lecture 23 TCP Port Scanning Techniques - Part 2

Lecture 24 Hacking the TCP Header - Part 1

Lecture 25 Hacking the TCP Header - Part 2

Lecture 26 Hacking the TCP Header - Part 3

Lecture 27 Discovering open ports using python - Part 1

Lecture 28 Discovering open ports using python - Part 2

Lecture 29 Discovering open ports using python - Part 3

Lecture 30 Discovering open ports using python - Part 4

Lecture 31 Discovering open ports using python - Part 5

Lecture 32 Discovering open ports using python - Part 6

Lecture 33 Discovering open ports using python - Part 7

Section 5: Bind Shell and Reverse Shell

Lecture 34 Shell fundamentals

Lecture 35 Bind Shell and Reverse Shell fundamentals

Lecture 36 Write a Bind Shell using python

Lecture 37 Write a Reverse Shell using python

Section 6: Cryptography and Password Hash Cracking

Lecture 38 Encoding and Hashing fundamentals

Lecture 39 Encryption Fundamentals

Lecture 40 Hybrid Encryption

Lecture 41 Building a Password Hash Cracker using python - Part 1

Lecture 42 Building a Password Hash Cracker using python - Part 2

Lecture 43 Building a Password Hash Cracker using python - Part 3

Lecture 44 Building a Password Hash Cracker using python - Part 4

Lecture 45 Building a Password Hash Cracker using python - Part 5

Lecture 46 AES Encryption using python - Part 1

Lecture 47 AES Encryption using python - Part 2

Lecture 48 AES Encryption using python - Part 3

Lecture 49 Hybrid Encryption (AES & RSA) using python - Part 1

Lecture 50 Hybrid Encryption (AES & RSA) using python - Part 2

Lecture 51 Hybrid Encryption (AES & RSA) using python - Part 3

Lecture 52 Hybrid Encryption (AES & RSA) using python - Part 4

Beginners and cyber security enthusiasts who want to follow an Ethical Hacking career,System administrators and network administrators who aim to improve the defense of their infrastructure

https://images2.imgbox.com/86/5f/PnGk0Kmd_o.jpg

AusFile
Python.For.Ethical.Hackers.and.Cyber.Security.Engineers.part1.rar
Python.For.Ethical.Hackers.and.Cyber.Security.Engineers.part2.rar
Python.For.Ethical.Hackers.and.Cyber.Security.Engineers.part3.rar
RapidGator
TurboBit
  • Добавлено: 07/04/2025
  • Автор: 0dayhome
  • Просмотрено: 1
Ссылки: (для качалок)
Общий размер публикации: 1,91 ГБ
Еще Видео: (похожие ссылки)


Написать комментарий