Learning Outcome:
Requirement:
Course Curriculum
Introduction to Python for ethical hacking!
Available in
days
days
after you enroll
-
Start
video1 - (Introduction - Welcome to Python For Ethical Hacking!)
(5:16)
-
Start
video2 - (Introduction - VirtualBox 6.0.4 Installation)
(11:41)
-
Start
video3 - (Introduction - Kali Linux 2019.1a Installation)
(17:07)
-
Start
video4 - (Introduction - Guest Additions Installation)
(15:08)
-
Start
video5 - (Introduction - Python In Kali Terminal)
(13:33)
Port and vulnerability scanning
Available in
days
days
after you enroll
-
Start
video6 - (Port And Vulnerability Scanning - Making Simple Portscanner)
(15:33)
-
Start
video7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner)
(9:24)
-
Start
video8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports)
(4:47)
-
Start
video9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1)
(13:13)
-
Start
video10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2)
(8:51)
-
Start
video11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner)
(9:00)
-
Start
video12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable)
(8:14)
-
Start
video13 - (Port and Vulnerability Scanning - Returning Banner From Open Port)
(14:46)
-
Start
video14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1)
(11:57)
-
Start
video15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2)
(7:21)
SSH & FTP attacks
Available in
days
days
after you enroll
-
Start
video16 - (SSH & FTP Attacks - Automating SSH Login Part 1)
(9:55)
-
Start
video17 - (SSH & FTP Attacks - Automating SSH Login Part 2)
(9:21)
-
Start
video18 - (SSH & FTP Attacks - Testing SSH Login Program)
(8:37)
-
Start
video19 - (SSH & FTP Attacks - Coding SSH Bruteforcer)
(10:38)
-
Start
video20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH)
(10:11)
-
Start
video21 - (SSH & FTP Attacks - Anonymus FTP Login Attack)
(9:55)
-
Start
video22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP)
(17:32)
-
Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
-
Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
-
Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
-
Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
-
Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
-
Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
-
Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
-
Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
-
Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
-
Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
-
Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
-
Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
-
Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
-
Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
-
Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
-
Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
-
Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
-
Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
-
Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
-
Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
-
Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
-
Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Reviews
Your Instructor
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Course Curriculum
-
Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
-
Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
-
Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
-
Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
-
Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
-
Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
-
Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
-
Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
-
Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
-
Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
-
Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
-
Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
-
Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
-
Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
-
Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
-
Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
-
Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
-
Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
-
Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
-
Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
-
Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
-
Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Frequently Asked Questions
- Aimee White
I've just finished the third module, the course is awesome, hands on and will really push your skills, up to date examples and will show you a REALLY interesting hacking capabilities in Python. I really recommend this course for anyone in infosec field. - Mike J