Time
1 hour 12 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
Hello one. Welcome to this course on developing ethical hacking tools with python. My name is Christian and I'm going to be a subject matter expert for the course.
00:09
I'm going to start with a few words about me. I am a cyber security analyst and penetration tester and cybersecurity is an area that I've been interested in for a very long time.
00:19
One of my goals for the near future is toe find a bridge between machine learning and cybersecurity
00:27
outside of this realm. In my spare time, I enjoy working out, especially lifting weights as well as High King.
00:35
Now that you know me a little bit better, let's see what this course is all about.
00:40
So you've come to the right place. If you're a computer science student wanting to get into ethical hacking,
00:47
this course is also for you. If you're a developer looking to get some hands on experience in the cyber security field,
00:55
if you're a working professional, you know, coding and you want to get into ethical hacking than this course is also for you,
01:03
Toby. Successful in discourse, you need to have a basic knowledge and understanding of the Python programming language
01:11
By the end of the course, he will be able to work with different by phone libraries related to cyber security.
01:17
You also know how to build Python script for your cyber security assessments,
01:22
and you will be able to combine multiple cyber security related by phone libraries for automating different aspects of your assessments
01:30
from a very high level perspective. Here's how the course looks like
01:34
so in the first module will be discussing the need for by phone and several security and why it makes one's work much more efficient and effective.
01:46
The second module is all about automating information gathering.
01:49
We'll be combining libraries such a Zen map with system modules to put steps of information gathering on autopilot.
01:57
Then in Module three, will be writing a key logger in Python
02:02
Module for is going to be about brute forcing, and we'll be building a zip password. Brute force. Sir,
02:09
you'll understand. That's actually really easy to do
02:14
if you get the underlying logic.
02:16
Lastly, in Module five will say goodbye and look into additional materials and resource is that will help you progress further and become even more skillful in this area.
02:29
My only requirement for you is to have a working installation of python on your system.
02:35
We'll be working with Python three, so please make sure to have it ready for the next lessons.
02:39
Additional resource is reference. Materials and links will be provided to you as we progress through the course. These will actually help you better understand and expand upon the concepts you've learned in the videos.
02:53
That being said, I'm Christian and I'm looking forward to working with you throughout this course.

Up Next

Developing Ethical Hacking Tools with Python

In this course you will learn to develop your own tools in Python, that will help you in your cybersecurity assessments.

Instructed By

Instructor Profile Image
Cristi Vlad
Cybersecurity Analyst
Instructor