This Course is part of a Career Path: Become a Cyber Defense Analyst
Module 1: Introduction
Module 2: Automating Information Gathering
Module 3: Writing a Keylogger in Python
Module 4: ZIP Password Bruteforcing in Python
Module 5: Going Forward
Have you ever wondered why some ethical hackers have an edge over other ethical hackers? One of the major reasons is that they can code their own tools and automate their security assessment processes. Most often than not they use scripting languages such as Python, which is relatively easy to understand and very powerful when you master it. Throughout this course you will learn how to combine multiple Python libraries that are related to cybersecurity so that you build an automated process of information gathering. You will also learn how to code a keylogger, as well as how to write a ZIP password bruteforcer in Python. Additional reading resources will be provided along the way.
Certificate of Completion
Complete this entire course to earn a Developing Ethical Hacking Tools with Python Certificate of Completion
See the full benefits of our immersive learning experience with interactive courses and guided career paths.