Python for Ethical Hackers
Designed to push your Python scripting skills to the next level!
CHF250.00
PFEH Course + Virtual Machines
In this course, you will learn how to be more effective in your job by automating boring, repetitive, and complex tasks using the Python programming language.
Duration
Approx. 3 months / 4 hrs per week
100% Online
Learn at your own pace
Certificate
Earn a Certificate upon completion
Level
Introductory
Today’s reality is this: No matter what business you are in, no matter where in the world you are – if you’ve got data, then your business is at constant risk. These are the words used by Robert J. McCullen to describe the current situation in the 2013 Global Security Report. IT and security professionals are faced with an increasing number of threats that are not only growing in volume, but also in sophistication and scale.
The Python for Ethical Hackers (PFEH) course provides you the tools and teach you the techniques to quickly identify and fix weaknesses in your corporate network. After a quick introduction to the Python programming language, you will learn through several hands-on exercises how to collect information about your target, launch complex Web attacks, extend world-class tools such as the Burp Suite and WinDbg, discover software vulnerabilities, write reliable exploits for Microsoft Windows, and develop custom scripts for your Android phone.
Welcome!
FREE PREVIEWIntroduction
Course Overview
How to use this course
Setting up the lab
Before we begin...
Module overview
Module objectives
Introduction to Python
Introduction to Python - Few words about Python
Data types and variables
Data types and variables - Basic Data Types in Python
Data types and variables - Conversion functions in Python
Operators and expressions
Conditional statements and loops
Functions and modules
Input / output
Errors and exceptions
Python Essentials Quiz
Exercises
Standard modules
The sys module
The os module
The re module
The socket module
Standard Modules Quiz
Exercises
Classes and objects
Debugging and introspection
Exercises
Overview
Passive information gathering with Google
Metadata analysis
Extracting metadata from PDF files
Extracting metadata from Microsoft Office files
Extracting information from social networks
Exercises
Overview
Network and port scanning with Nmap
Network traffic analysis
PCAP file parsing
Packet sniffing
Packet manipulation
Scapy API
Exercises
Overview
HyperText Markup Language (HTML) analysis
Extending the Burp Suite in Python
Burp Extender API
HTTP traffic analysis with the Burp Suite
Building custom Web exploits from scratch
Exercises
Overview
Static analysis with IDA Pro
What is IDAPython?
IDAPython basics
Analyzing functions in IDAPython
Enumerating the attack surface of an application with IDAPython
Analyzing live applications with WinDbg
PyKD basics
Scripting WinDBG with PyKd
Binary analysis with Immunity Debugger
Writing a custom PyCommand for the Immunity Debugger
Building custom exploits from scratch
Antivirus and IDS evasion
Exercises
Module overview
Module objectives
Android platform overview
Python for Android
Installing Python for Android
Hello World with QPython
Writing Python scripts for Android
Android & SL4A Quiz
Exercises
More resources for you
Congrats! Here's what's next.
Before you go...
CHF250.00
PFEH Course + Virtual Machines