This Course is part of a Career Path: Become a Cyber Defense Analyst

Course Content

Module 1: Introduction

02:59
1.1 Introduction
06:30
1.2 Why Cybersecurity Analysts and Penetration Testers Need Python

Module 2: Automating Information Gathering

05:52
2.1 A Review of the Typical Pentesting Process
09:15
2.2 Combining Python Modules for Active Info Gathering Part 1
09:41
2.3 Combining Python Modules for Active Info Gathering Part 2

Module 3: Writing a Keylogger in Python

06:04
3.1 Writing a Keylogger in Python Part 1
06:09
3.2 Writing a Keylogger in Python Part 2
06:18
3.3 Writing a Keylogger in Python Part 3

Module 4: ZIP Password Bruteforcing in Python

06:18
4.1 Bruteforcing ZIP Passwords with Python Part 1
06:09
4.2 Bruteforcing ZIP Passwords with Python Part 2
04:44
4.3 Bruteforcing ZIP Passwords with Python Part 3

Module 5: Going Forward

02:20
5.1 Additional Resources and Conclusion

Course Description

Have you ever wondered why some ethical hackers have an edge over other ethical hackers? One of the major reasons is that they can code their own tools and automate their security assessment processes. Most often than not they use scripting languages such as Python, which is relatively easy to understand and very powerful when you master it. Throughout this course you will learn how to combine multiple Python libraries that are related to cybersecurity so that you build an automated process of information gathering. You will also learn how to code a keylogger, as well as how to write a ZIP password bruteforcer in Python. Additional reading resources will be provided along the way.

Instructed By

Instructor Profile Image
Cristi Vlad
Senior DevOps Engineer at Ammeon
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Developing Ethical Hacking Tools with Python Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.