Learn Ethical Hacking & Build Python Attack & Defense Tools
- Description
- Curriculum
- FAQ
- Reviews
Welcome to “Learn Ethical Hacking – Build Python Attack & Defense Tools,” a comprehensive course that will teach you how to become an ethical hacker and build powerful tools using Python.
In this course, you’ll learn how to think like a hacker and use that knowledge to protect your own systems from attack. You’ll explore the different types of attacks, from phishing to denial of service, and learn how to defend against them. You’ll also learn how to use Python to create your own custom attack and defense tools.
This course is designed for anyone who wants to learn ethical hacking and how to use Python to build attack and defense tools. Whether you’re a beginner or an experienced programmer, you’ll find this course to be informative and engaging.
Some of the topics covered in this course include:
-
Understanding the basics of ethical hacking
-
The different types of attacks and how to defend against them
-
How to use Python to build custom attack and defense tools
-
Creating a port scanner using Python
-
Developing a password cracker using Python
-
Building a network sniffer using Python
-
Hacking the DVWA using Kali Linux
-
Computer Networking Crash course (OSI TCP/IP Protocol suite)
By the end of this course, you’ll have a strong understanding of ethical hacking and how to use Python to build powerful attack and defense tools. You’ll also have the skills and knowledge you need to pursue a career in cybersecurity or advance in your current role.
Enroll now and take the first step towards becoming an ethical hacker and Python developer.
-
1Build A Port ScannerVideo lesson
-
2Build Anonymous FTP ScannerVideo lesson
-
3Build a Network tracker using Wireshark and Google MapsVideo lesson
-
4Build a Zip File Password CrackerVideo lesson
-
5Find Deleted Files Using PythonVideo lesson
-
6Brute Force FTP Accounts Using PythonVideo lesson
-
7Nmap and Python scripting (Information Gathering)Video lesson
-
8Crack Passwords (Dictionary Attack)Video lesson
-
9Submit your Port ScannerQuiz
-
10Wireshark IntroductionVideo lesson
-
11Wireshark (Capture and Protocol Filters)Video lesson
-
12Wireshark TLS HandshakeVideo lesson
-
13Wireshark (Decrypt TLS Traffic)Video lesson
-
14Capture Wireless Traffic using Monitor ModeVideo lesson
-
15Trace IP LocationVideo lesson
-
16Analyse your networkText lesson

External Links May Contain Affiliate Links read more