Free

Intermediate Python for Cybersecurity Professionals

3
17
M
Time
intermediate
difficulty
3
ceu/cpe

Course Content

Creating Modules

4m

Errors and Exception Handling
Built-In Functionality of Python

5m

Errors and Exception Handling
Modules and Functions in Course Projects

5m

Errors and Exception Handling
Keys to Using Modules

5m

Errors and Exception Handling
Challenge Questions

12m

Object Oriented Programming
Iterators and Generators

11m

Object Oriented Programming
Inheritance and Special Methods

19m

Object Oriented Programming
How OOP fits into our Course Projects

5m

Object Oriented Programming
Keys to Using Classes

9m

Object Oriented Programming
Challenge Questions

12m

Working with Inputs and Outputs (I/O)
Command Line Arguments

10m

Working with Inputs and Outputs (I/O)
File Inputs and Outputs

7m

Working with Inputs and Outputs (I/O)
How I/O fits into our Course Projects

12m

Working with Inputs and Outputs (I/O)
Keys to Using Inputs Effectively

5m

Working with Inputs and Outputs (I/O)
Challenge Questions

10m

Working in Python Using Encryption
Python Using Encryption Project

20m

Working in Python Using Encryption
Basic Python Review

4m

Introduction: Reviewing Python Basics
The Real World Applicability of Skills

3m

Introduction: Reviewing Python Basics
Instructor's Welcome

8m

Introduction: Reviewing Python Basics
Why Complete This Project?

4m

Building a Password Strength Tester
Course Description

This course will provide beginners with the tools they need to read, understand, and develop basic Python scripts. This course is tailored to the context of cybersecurity (both offensive and defensive), but the concepts can be used across DevOps, Software Engineering, Academic Research, Accounting, Finance, and more.

Who should take this course?

This course is applicable for anyone starting out with Python, from students early in their careers to non-technical professionals transitioning to cybersecurity, and others who have no python or even coding experience but want to be able to use python for cybersecurity purposes.

What are the prerequisites for this course?

This is a beginner-level course. There is no actual prerequisite knowledge needed. But you will need a computer with Google Chrome installed and a willingness to learn!

Why take this course?

What makes this course so beneficial is that you will quickly get up and running with Python and create your first script in the first module. You will also be able to debug Python code and automate security tasks to improve your efficiency in your cybersecurity role.

What makes this course different from others?

This course focuses on enabling you to code from the very beginning, with project-based tasks so you can learn by doing. By the end of this course, you will be able to:

  • Read and understand python code
  • Create and Implement basic Python scripts
  • Efficiently debug basic Python security scripts
  • Automate basic offensive and defensive security tasks
  • Your instructor, Imran Muthuvappa, is a co-founder and CTO at the company Kayyo. He started troubleshooting and hacking computers at a young age and is passionate about sharing what he knows. His curiosity led him to pursue a career in technology, and in college, he conducted research related to privacy in social networks and blockchain-based intrusion detection. He created a prototype in Python demonstrating how IoT devices could store and publish transaction history in the form of a blockchain. He also went on to tutor and mentor other programmers and peers in related topics. He later worked on SOAR automation at Palo Alto Networks before ultimately co-founding Kayyo.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Imran Muthuvappa

    I was born and raised in upstate New York, where I remember helping my elementary school teachers with their computer problems, hacking wifi networks, and even mining bitcoin on high school computers. (Luckily, I didnt get in trouble for that!) In university, I did three semesters of research in privacy in social networks, blockchain-based intrusion detection, and more. The research position required me to gain expertise in networking, cryptography, and social media. More specifically, for the P-Chain project, I created a prototype demonstrating how IoT devices could store and publish transaction history in the form of a blockchain, as well as other types of DAG’s. This implementation was in Python. I actively contributed to open source in college and tutored many peers on topics in cybersecurity and computer science in undergrad.

    My curiosity led me to a career in technology, and my background in research and cybersecurity led me to Palo Alto Networks. There, I worked cross functionally with sales, IT, security, marketing, and more! Through that experience, I learned a ton and found that my unique skillset was mainly around communication, product, and engineering. While at Palo Alto Networks, I won 2 hackathons and a capture the flag competition. My work in IT and SOAR automation enabled me to join sales calls as an occasional sales engineer for the XSOAR product. From there, I began freelancing and ultimately ended up cofounding a company called Kayyo, where I actively lead as a CTO for a team of 4.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Intermediate Python for Cybersecurity Professionals Certificate of Completion