только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Видео уроки web-design » Learn Ethical Hacking & Build Python Attack & Defense Tools

Learn Ethical Hacking & Build Python Attack & Defense Tools

Learn Ethical Hacking & Build Python Attack & Defense Tools

Learn Ethical Hacking & Build Python Attack & Defense Tools
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.54 GB | Duration: 4h 56m



Ethical Hacking using Python Hacking tools, Wireshark, and Kali Linux. The full Cybersecurity Expert Path

What you'll learn
Intercept network traffic & modify it on the fly.
Learn ethical hacking, its fields & the different types of hackers.
Develop Python Hacking tools for Offense
Install & use Kali Linux - a penetration testing operating system.
Develop Python Hacking tools for Defense
Python Security
How to use Wireshark
How to hack web systems using DVWA
Computer Networking
TCP/IP Protocol suite
How to use Burp Suite
CIA Triad
What a honeypot it

Requirements
No programming experience is needed however a basis understanding of Python is recommended
A computer with access to the Internet

Description
Welcome to "Learn Ethical Hacking - Build Python Attack & Defense Tools," a comprehensive course that will teach you how to become an ethical hacker and build powerful tools using Python.In this course, you'll learn how to think like a hacker and use that knowledge to protect your own systems from attack. You'll explore the different types of attacks, from phishing to denial of service, and learn how to defend against them. You'll also learn how to use Python to create your own custom attack and defense tools.This course is designed for anyone who wants to learn ethical hacking and how to use Python to build attack and defense tools. Whether you're a beginner or an experienced programmer, you'll find this course to be informative and engaging.Some of the topics covered in this course include:Understanding the basics of ethical hackingThe different types of attacks and how to defend against themHow to use Python to build custom attack and defense toolsCreating a port scanner using PythonDeveloping a password cracker using PythonBuilding a network sniffer using PythonHacking the DVWA using Kali LinuxComputer Networking Crash course (OSI TCP/IP Protocol suite)By the end of this course, you'll have a strong understanding of ethical hacking and how to use Python to build powerful attack and defense tools. You'll also have the skills and knowledge you need to pursue a career in cybersecurity or advance in your current role.Enroll now and take the first step towards becoming an ethical hacker and Python developer.

Overview
Section 1: Build Your Own Python Hacking Tools

Lecture 1 Build A Port Scanner

Lecture 2 Build Anonymous FTP Scanner

Lecture 3 Build a Network tracker using Wireshark and Google Maps

Lecture 4 Build a Zip File Password Cracker

Lecture 5 Find Deleted Files Using Python

Lecture 6 Brute Force FTP Accounts Using Python

Lecture 7 Nmap and Python scripting (Information Gathering)

Lecture 8 Crack Passwords (Dictionary Attack)

Section 2: Network Analysis Using Wireshark

Lecture 9 Wireshark Introduction

Lecture 10 Wireshark (Capture and Protocol Filters)

Lecture 11 Wireshark TLS Handshake

Lecture 12 Wireshark (Decrypt TLS Traffic)

Lecture 13 Capture Wireless Traffic using Monitor Mode

Lecture 14 Trace IP Location

Section 3: Hack a Web Application using Kali Linux

Lecture 15 Setup DVWA

Lecture 16 SQL Injection Part 1

Lecture 17 SQL Injection Part 2

Lecture 18 Brute Force (Burp Suite)

Lecture 19 CSRF (Burp Suite)

Section 4: Networking & Honeypots

Lecture 20 What is a Honeypot? and Why you can use them

Lecture 21 CIA Triad

Lecture 22 Networking Crash Course (OSI & TCP/IP Protocol Suite)

People interested in learning ethical hacking / penetration testing,People interested in learning how hackers hack computer systems,People interested in learning how to secure systems from hackers (Ethical Hacking)

HOMEPAGE


  https://www.udemy.com/course/learn-ethical-hacking-build-python-attack-defense-tools/ 


DOWNLOAD


https://rapidgator.net/file/2a3d76a19449be31f47420a0747eef3d/Learn_Ethical_Hacking_Build_Python_Attack_Defense_Tools.part1.rar.html
https://rapidgator.net/file/639791dbff1179fd893fe54c33ad929f/Learn_Ethical_Hacking_Build_Python_Attack_Defense_Tools.part2.rar.html

https://uploadgig.com/file/download/f9250337314b7f7A/Learn_Ethical_Hacking_Build_Python_Attack_Defense_Tools.part1.rar
https://uploadgig.com/file/download/3513A76fAe365428/Learn_Ethical_Hacking_Build_Python_Attack_Defense_Tools.part2.rar
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.