Treten Academy course - Python for Ethical Hackers

Python for Ethical Hackers

scholarundefined
About this course

The Python for Ethical Hackers course provides you the tools and teach you the techniques to quickly identify and fix weaknesses in your corporate network. The course dives directly into the Python programming language, you will learn through several hands-on exercises how to collect information about your target, use python to develop tools to test network security, launch complex Web attacks, extend world-class tools such as the Burp Suite and WinDbg, discover software vulnerabilities, write reliable exploits for Microsoft Windows, and develop custom scripts for your Android phone.


Why Python?

  • Easy to learn
  • Cross platform
  • Unlimited third party libraries
  • Get your job done with few lines
  • Ranked as #1 for the most popular programming languages
  • Plenty of open source hacking tools are written in python which can be easily integrated within your script


What is the target audience?

  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cyber security consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty


Highlights

  • Develop custom applications for extracting data from social networks.
  • Understand how to develop customized network reconnaissance tools.
  • Learn to automate complex network and Web attacks.
  • Utilize Python to rapidly develop remote exploits.
  • Learn to evade antivirus and IDS software with python

Requirements

  • Laptop with at least forty (40) GB of free hard drive space and eight (8) GB of RAM.
  • Latest Oracle VM VirtualBox and VirtualBox Extension Pack installed.
Course syllabus
Course content
Introduction
maximize

Setting Up Your Environment
maximize

Developing A Port And Vulnerability Scanner
maximize

Developing Offensive SSH & FTP Attacks Scripts
maximize

Password Cracking
maximize

Developing Sniffing, Flooding & Spoofing Tools
maximize

Developing A DNS Spoofer
maximize

Network Analysis
maximize

Developing Multi-functional Reverse Shells
maximize

Developing A Keylogger
maximize

Creating A Custom Command And Control Center
maximize

Website Penetration Testing With Python
maximize

How it works
coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

peers
Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

Course reviews
cancel

No reviews yet

FAQs
cancel

No Faqs yet