5.1 Additional Resources and Conclusion
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Time
1 hour 12 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:00
Hello and welcome to this final video in the ethical Hacking tools with Python course,
00:05
I want to sincerely congratulate you for completing discourse in which I believe you've learned quite a few concepts and techniques on how to build and stuck together by phone modules for your cyber security assessments. So what did we go through in this course
00:21
now? In retrospect, in Module one, we looked into the need for python in cyber security,
00:27
then in module to we combined Bison Library's for automating active information gathering.
00:34
Then, in Module three, we wrote a key logger and by phone with the bent but library and finally in module for we coded a zip *** booth four sir in Python.
00:46
Next, let me give you a few Resource is that will further build on the knowledge you've learned in this course.
00:53
So to deepen your knowledge and python penetration, testing and ethical hacking, I suggest you look first into the following courses from cyber re. So the 1st 1 is penetration, testing an ethical hacking. But can Underhill.
01:08
The 2nd 1 is ah Python for security professionals by Joe Perry, and the 3rd 1 is advanced penetration testing by Georgia Weetman.
01:18
Okay, if you are more into reading books than in taking video courses, I recommend you look into the book Python penetration Testing for Developers by Christopher Duffy and all,
01:30
um, And for more hands on practice, which is what I personally do the most, I suggest you look into their hands on labs here at Cyber,
01:42
which, um,
01:42
provided with dozens of scenarios for attacking and defending assets. Some of the practice labs will teach you, quoting
01:52
others will take you through Web vulnerabilities, and some of them will even teach you how to take down a botnet.
01:57
Okay, Another good resource to practice and build your coding skills is Cold War's dot com.
02:06
So please make sure to check all of them out.
02:08
Now. That being said, my name is Cristian. I have been your instructor for this course, and I'm wishing you the best of luck as you continue becoming a cybersecurity expert
Instructed By
Similar Content