Free

Intermediate Python for Cybersecurity Professionals

3
17
M
Time
intermediate
difficulty
3
ceu/cpe

Course Content

Keys to Using Modules

5m

Errors and Exception Handling
Keys to Using Inputs Effectively

5m

Working with Inputs and Outputs (I/O)
Keys to Using Classes

9m

Object Oriented Programming
Instructor's Welcome

8m

Introduction: Reviewing Python Basics
Python Using Encryption Project

20m

Working in Python Using Encryption
Modules and Functions in Course Projects

5m

Errors and Exception Handling
How OOP fits into our Course Projects

5m

Object Oriented Programming
How I/O fits into our Course Projects

12m

Working with Inputs and Outputs (I/O)
The Real World Applicability of Skills

3m

Introduction: Reviewing Python Basics
Why Complete This Project?

4m

Building a Password Strength Tester
Built-In Functionality of Python

5m

Errors and Exception Handling
Challenge Questions

10m

Working in Python Using Encryption
Inheritance and Special Methods

19m

Object Oriented Programming
File Inputs and Outputs

7m

Working with Inputs and Outputs (I/O)
Basic Python Review

4m

Introduction: Reviewing Python Basics
Iterators and Generators

11m

Object Oriented Programming
Creating Modules

4m

Errors and Exception Handling
Command Line Arguments

10m

Working with Inputs and Outputs (I/O)
Challenge Questions

12m

Object Oriented Programming
Challenge Questions

12m

Working with Inputs and Outputs (I/O)
Course Description

This course will provide beginners with the tools they need to read, understand, and develop basic Python scripts. This course is tailored to the context of cybersecurity (both offensive and defensive), but the concepts can be used across DevOps, Software Engineering, Academic Research, Accounting, Finance, and more.

Who should take this course?

This course is applicable for anyone starting out with Python, from students early in their careers to non-technical professionals transitioning to cybersecurity, and others who have no python or even coding experience but want to be able to use python for cybersecurity purposes.

What are the prerequisites for this course?

This is a beginner-level course. There is no actual prerequisite knowledge needed. But you will need a computer with Google Chrome installed and a willingness to learn!

Why take this course?

What makes this course so beneficial is that you will quickly get up and running with Python and create your first script in the first module. You will also be able to debug Python code and automate security tasks to improve your efficiency in your cybersecurity role.

What makes this course different from others?

This course focuses on enabling you to code from the very beginning, with project-based tasks so you can learn by doing. By the end of this course, you will be able to:

  • Read and understand python code
  • Create and Implement basic Python scripts
  • Efficiently debug basic Python security scripts
  • Automate basic offensive and defensive security tasks
  • Your instructor, Imran Muthuvappa, is a co-founder and CTO at the company Kayyo. He started troubleshooting and hacking computers at a young age and is passionate about sharing what he knows. His curiosity led him to pursue a career in technology, and in college, he conducted research related to privacy in social networks and blockchain-based intrusion detection. He created a prototype in Python demonstrating how IoT devices could store and publish transaction history in the form of a blockchain. He also went on to tutor and mentor other programmers and peers in related topics. He later worked on SOAR automation at Palo Alto Networks before ultimately co-founding Kayyo.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Imran Muthuvappa

    I was born and raised in upstate New York, where I remember helping my elementary school teachers with their computer problems, hacking wifi networks, and even mining bitcoin on high school computers. (Luckily, I didnt get in trouble for that!) In university, I did three semesters of research in privacy in social networks, blockchain-based intrusion detection, and more. The research position required me to gain expertise in networking, cryptography, and social media. More specifically, for the P-Chain project, I created a prototype demonstrating how IoT devices could store and publish transaction history in the form of a blockchain, as well as other types of DAG’s. This implementation was in Python. I actively contributed to open source in college and tutored many peers on topics in cybersecurity and computer science in undergrad.

    My curiosity led me to a career in technology, and my background in research and cybersecurity led me to Palo Alto Networks. There, I worked cross functionally with sales, IT, security, marketing, and more! Through that experience, I learned a ton and found that my unique skillset was mainly around communication, product, and engineering. While at Palo Alto Networks, I won 2 hackathons and a capture the flag competition. My work in IT and SOAR automation enabled me to join sales calls as an occasional sales engineer for the XSOAR product. From there, I began freelancing and ultimately ended up cofounding a company called Kayyo, where I actively lead as a CTO for a team of 4.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Intermediate Python for Cybersecurity Professionals Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.