Python & Bash For Ethical Hackers & CyberSecurity Engineers

Become a Penetration Tester and Cyber Security Analyst, and build your own hacking tools using Python/Bash Scripting.

Ratings 4.81 / 5.00
Python & Bash For Ethical Hackers & CyberSecurity Engineers

What You Will Learn!

  • Python scripting and Ethical hacking
  • Write your own hacking tools using python
  • Linux Administration and Bash Scripting
  • Build a strong foundation in networking protocols
  • Build a strong foundation in cryptography
  • Lean data encoding, hashing and encryption
  • build your hacking tool to encrypt and decrypt data using AES algorithm
  • Implement an Hybrid Encryption in python, by generating an RSA private and public keys and encrypting the AES session Key
  • Build a password cracker in python, to retrieve a password from a given hashing
  • Learn the OSI model, data encapsulation and how network packets are constructed and transferred from one machine to another
  • Write you own python script to spoof your MAC address
  • Dive Deep into ARP protocol and build a network scanner to discover live hosts
  • Acquire a comprehensive understanding of the IP and ICMP protocol
  • Learn how to build your own hacking tool to trace route an IP address
  • Learn the TCP protocol, how an connection is established during a TCP handshake and the type of TCP packets
  • Dive Deep into TCP port Scanning techniques like SYN_SCAN, ACK_SCAN and FIN_SCAN
  • Write a python script to scan TCP ports
  • Learn Hacking websites
  • Deep dive into website Key Concepts
  • Dive Deep into Domain Name System (DNS) architecture and functionalities
  • Learn PHP and how to write a stealthy obfuscated Web Shell
  • Learn SQL Database Servers Key Concepts and SQL language
  • Exploit SQL Injection Vulnerability
  • Learn the fundamentals about Bind Shell and Reverse Shell
  • write your own Bind Shell in python language
  • write your own reverse Shell in python language
  • Setup a vulnerable virtual machine and use it to practice your hacking skills
  • Privilege Escalation Techniques

Description

  • This course is focused on learning by doing. In this course you will learn both Ethical Hacking and Programming at the same time. First you learn the basic theoretical knowledge about a given topic, then you apply this knowledge by building a hacking tool using python scripting.


  • On this course we will focus on the following topics: Networking, Linux, Bash Scripting, Python Scripting, Website Hacking, Bind/Reverse Shells, Data Encryption and Password Cracking.


  • 1- We dive into details about the OSI model, data encapsulation and how network packets are constructed and exchanged between different hosts.

  • 2- We will learn Linux administration and Bash scripting


  • 3- We will learn Python scripting (Managing system files, Making HTTP Requests, threading...)

  • 4- We learn how data is exchanged using both the MAC address and the IP address.


  • 5- We write a python script that will spoof our MAC address.


  • 6- We learn the inner working of the ARP protocol and we apply that knowledge by writing a network scanner using python scripting. A network scanner will discover all live hosts inside our local network using ARP Requests and Replies.


  • 7- We dive into details about IP protocol and ICMP protocol, and we apply this theoretical knowledge by writing a python script that will trace route an IP address and discover all the routers in the path to the target IP address.


  • 8- We build the required knowledge about TCP protocol, how a connection is made during TCP handshake, and how to scan a target host to discover its open ports using TCP port scanning techniques. We write a python script to scan for open ports using TCP_SYN_SCAN, TCP_ACK_SCAN, TCP_FIN_SCAN...


  • 9- We learn how to connect to a target machine and get a shell terminal to execute commands on this target machine, using BIND SHELL and REVERSE SHELL. We write a BIND SHELL and REVERSE SHELL using python scripting.


  • 10- We learn the fundamentals skills about Cryptography, like Data Encoding, Data Hashing, Data Encryption/Decryption, and Password Hash Cracking.


  • 11- We apply the theoretical knowledge about Cryptography by implementing an Hybrid Encryption in Python using RSA Asymmetric Encryption and AES Symmetric Encryption.


  • 12- We write a Password Hash Cracking Tool using Python Scripting.


  • 13- We dive into details about website hacking.


  • 14- We write PHP code and build a stealthy obfuscated web shell


  • 15- we write SQL code and exploit SQL injection vulnerability


  • 16 - Setup a vulnerable virtual machine and use it to practice your hacking skills


  • 17- Privilege Escalation Techniques

Who Should Attend!

  • Beginners and cyber security enthusiasts who want to follow an Ethical Hacking career
  • System administrators and network administrators who aim to improve the defense of their infrastructure

TAKE THIS COURSE

Tags

Subscribers

313

Lectures

153

TAKE THIS COURSE