13 Sections
83 Lessons
10 Weeks
Expand all sections
Collapse all sections
Introduction to Python for Cyber Security
4
1.1
Introduction to the Course
1.2
Basics of VS Code
1.3
Understanding the Working of Python
1.4
Running python program via Interactive mode and via Script mode
Python Fundamentals
6
2.1
Operators in Python
2.2
Variables and Data Types in Python
2.3
Conditional Statements in Python (if, elif, else)
2.4
Loops in Python
2.5
Functions in Python
2.6
Modules and Packages in Python
Data Structures and Basic Algorithms
9
3.1
Working of Collections in Python
3.2
List Comprehension and Basic Manipulation in Python
3.3
String slicing, formatting, and built-in string methods
3.4
Searching techniques
3.5
Binary Search
3.6
Depth First Search
3.7
Breadth First Search
3.8
Sorting (Merge Sort)
3.9
Quick Sort
File Handling, Data Parsing and Log Analysis
5
4.1
Reading and Writing files in Python
4.2
Handling file exceptions and ensuring data integrity
4.3
Regular Expressions with Python
4.4
Processing Data from Structured and Unstructured Sources
4.5
Techniques for Parsing and Analyzing log files
Networking and Socket Programming
7
5.1
Basic Network Protocols
5.2
Understanding the Client-Server Model
5.3
Understanding the OSI Model
5.4
Data Transmission over TCP IP Model
5.5
Creating a Basic Client and Server
5.6
Developing scripts to perform simple network operations
5.7
Simulating basic network scans and status checks
Automation and Scripting for Cybersecurity Tasks
4
6.1
Writing scripts to automate file management, data extraction, and system mon
6.2
Scheduling and Executing Automated Tasks for Routine Security Checks
6.3
Parsing command-line arguments and designing user-friendly scripts
6.4
Logging in Python
Web Scrapping and Data Collections for Threat Intelligence
5
7.1
Introduction to Web Scraping
7.2
Legal and ethical considerations in data collection
7.3
Writing scripts to fetch and parse web pages
7.4
Extracting threat intelligence from web and API sources
7.5
Storing scraped data for the further analysis
Interacting with APIs and Cyber Threat Intelligence Feeds
5
8.1
Introduction to API
8.2
Overview of REST API
8.3
Building API Clients
8.4
Interacting with APIs
8.5
Aggregating Data from Multiple Sources for Threat Intelligence
Advanced Python Techniques for Cybersecurity
8
9.1
Introduction to Multithreading and Asynchronous Programming
9.2
Using Multithreading and Asynchronous Programming to improve Cyber Security
9.3
Using ThreadPoolExecutor for efficient thread management
9.4
Advance Error Handling, Logging and Debugging in Python
9.5
Combining networking, file handling, and data analysis techniques
9.6
Improve this script using multithreading
9.7
Case studies on automating complex cybersecurity workflows
9.8
What is SDLC and SSDLC , and its various Models
Project-1 reconnaissance tool
6
10.1
Project-1 reconnaissance tool Overview
10.2
Project-1 reconnaissance tool Part-1
10.3
Project-1 reconnaissance tool Part-2
10.4
Project-1 reconnaissance tool Part-3
10.5
Project-1 reconnaissance tool Part-4
10.6
Project-1 reconnaissance tool Part-5
Project-2 Password Hash Cracker
9
11.1
Project-2 Password Hash Cracker Overview
11.2
Project-2 Password Hash Cracker Overview Part-2
11.3
Project-2 Password Hash Cracker Part-1
11.4
Project-2 Password Hash Cracker Part-2
11.5
Project-2 Password Hash Cracker Part-3
11.6
Project-2 Password Hash Cracker Part-4
11.7
Project-2 Password Hash Cracker Part-5
11.8
Project-2 Password Hash Cracker Part-6
11.9
Project-2 Password Hash Cracker Part-7
Project 3
10
12.1
How to install nmap on window OS
12.2
Project-3 Overview
12.3
Project-3 Part-1
12.4
Project-3 Part-2
12.5
Project-3 Part-3
12.6
Project-3 Part-4
12.7
Project-3 Part-5
12.8
Project-3 Part-6
12.9
Project-3 Part-7
12.10
Project-3 Part-8
Tips and Career Guidance
5
13.1
Brute force
13.2
How to prepare a detailed report
13.3
Recieving feedback and refining project
13.4
Cybersecurity roles where python skills are essential
13.5
Future scope after completing this course
Learn Python for Cybersecurity and Ethical Hacking
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Home
Courses
Search
Search
Account
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content