5.1 Additional Resources and Conclusion
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
1 hour 12 minutes
Hello and welcome to this final video in the ethical Hacking tools with Python course,
I want to sincerely congratulate you for completing discourse in which I believe you've learned quite a few concepts and techniques on how to build and stuck together by phone modules for your cyber security assessments. So what did we go through in this course
now? In retrospect, in Module one, we looked into the need for python in cyber security,
then in module to we combined Bison Library's for automating active information gathering.
Then, in Module three, we wrote a key logger and by phone with the bent but library and finally in module for we coded a zip *** booth four sir in Python.
Next, let me give you a few Resource is that will further build on the knowledge you've learned in this course.
So to deepen your knowledge and python penetration, testing and ethical hacking, I suggest you look first into the following courses from cyber re. So the 1st 1 is penetration, testing an ethical hacking. But can Underhill.
The 2nd 1 is ah Python for security professionals by Joe Perry, and the 3rd 1 is advanced penetration testing by Georgia Weetman.
Okay, if you are more into reading books than in taking video courses, I recommend you look into the book Python penetration Testing for Developers by Christopher Duffy and all,
um, And for more hands on practice, which is what I personally do the most, I suggest you look into their hands on labs here at Cyber,
provided with dozens of scenarios for attacking and defending assets. Some of the practice labs will teach you, quoting
others will take you through Web vulnerabilities, and some of them will even teach you how to take down a botnet.
Okay, Another good resource to practice and build your coding skills is Cold War's dot com.
So please make sure to check all of them out.
Now. That being said, my name is Cristian. I have been your instructor for this course, and I'm wishing you the best of luck as you continue becoming a cybersecurity expert