IT & Software

Python for Ethical Hacking and Penetration Testing

Course Overview

  • Course Title: Python for Ethical Hacking and Penetration Testing
  • Instructor: Neamatullah Ekhteyari
  • Target Audience:
    • Beginners with no coding experience
    • IT professionals looking to expand their skills
    • Individuals curious about ethical hacking and cybersecurity
  • Prerequisites:
    • Basic computer knowledge
    • A computer with at least 4GB RAM (for virtual machines)
    • Curiosity to explore cybersecurity ethically

Curriculum Highlights

  • Key Topics Covered:
    • Setting up an ethical hacking lab with Kali Linux and Python
    • Python basics through cybersecurity-focused examples
    • Developing socket communication tools
    • Creating and decrypting encrypted files with Python
    • Building malware-like tools: keyloggers, backdoors, and trojans
    • Sniffing packets and analyzing network traffic with Scapy
    • Detecting ARP spoofing attacks
    • Remotely controlling machines using Telnet and SSH in Python
    • Cracking passwords and hashes using Python scripting
    • Packaging Python programs into Windows executables
    • Automating website blocking and creating background-running services
  • Key Skills Learned:
    • Setting up a professional virtual lab with Kali Linux and Windows
    • Mastering Python basics with cybersecurity-focused examples
    • Automating tasks using loops, functions, and control flow
    • Building secure file encryption and decryption tools
    • Developing advanced socket programs: client-server chat, file sharing, command execution
    • Sniffing network packets and extracting data using Scapy
    • Creating powerful ARP spoofing tools and detection systems
    • Writing a remote access backdoor and command execution system
    • Converting Python scripts into Windows executables (.exe)
    • Creating malware with persistence that runs on system startup
    • Building and automating a website blocker for Linux and Windows
    • Cracking hashed passwords, ZIP files, and Windows login passwords
    • Using Telnet and SSH protocols to control machines remotely

Course Format

  • Duration: 17.5 hours on-demand video
  • Format: Self-paced online course
  • Resources:
    • Access on mobile and TV
    • Certificate of completion
Get Coupon on Udemy