 
                        Learning Outcome:
Requirement:
                          Course Curriculum
                        
                        
                      
                      
                        
                          
  
    
      
         
      
      Introduction to Python for ethical hacking!
      
        
          Available in
          
          days
        
        
          
          days
          after you enroll
        
      
    
    
      
      - 
        
          
          
            
              Start
              
          
          video1 - (Introduction - Welcome to Python For Ethical Hacking!)
          
            (5:16)
          
        
      
- 
        
          
          
            
              Start
              
          
          video2 - (Introduction - VirtualBox 6.0.4 Installation)
          
            (11:41)
          
        
      
- 
        
          
          
            
              Start
              
          
          video3 - (Introduction - Kali Linux 2019.1a Installation)
          
            (17:07)
          
        
      
- 
        
          
          
            
              Start
              
          
          video4 - (Introduction - Guest Additions Installation)
          
            (15:08)
          
        
      
- 
        
          
          
            
              Start
              
          
          video5 - (Introduction - Python In Kali Terminal)
          
            (13:33)
          
        
      
Port and vulnerability scanning
      
        
          Available in
          
          days
        
        
          
          days
          after you enroll
      
      - 
        
          
          
            
              Start
              
          
          video6 - (Port And Vulnerability Scanning - Making Simple Portscanner)
          
            (15:33)
          
        
      
- 
        
          
          
            
              Start
              
          
          video7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner)
          
            (9:24)
          
        
      
- 
        
          
          
            
              Start
              
          
          video8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports)
          
            (4:47)
          
        
      
- 
        
          
          
            
              Start
              
          
          video9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1)
          
            (13:13)
          
        
      
- 
        
          
          
            
              Start
              
          
          video10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2)
          
            (8:51)
          
        
      
- 
        
          
          
            
              Start
              
          
          video11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner)
          
            (9:00)
          
        
      
- 
        
          
          
            
              Start
              
          
          video12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable)
          
            (8:14)
          
        
      
- 
        
          
          
            
              Start
              
          
          video13 - (Port and Vulnerability Scanning - Returning Banner From Open Port)
          
            (14:46)
          
        
      
- 
        
          
          
            
              Start
              
          
          video14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1)
          
            (11:57)
          
        
      
- 
        
          
          
            
              Start
              
          
          video15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2)
          
            (7:21)
          
        
      
SSH & FTP attacks
      
        
          Available in
          
          days
        
        
          
          days
          after you enroll
      
      - 
        
          
          
            
              Start
              
          
          video16 - (SSH & FTP Attacks - Automating SSH Login Part 1)
          
            (9:55)
          
        
      
- 
        
          
          
            
              Start
              
          
          video17 - (SSH & FTP Attacks - Automating SSH Login Part 2)
          
            (9:21)
          
        
      
- 
        
          
          
            
              Start
              
          
          video18 - (SSH & FTP Attacks - Testing SSH Login Program)
          
            (8:37)
          
        
      
- 
        
          
          
            
              Start
              
          
          video19 - (SSH & FTP Attacks - Coding SSH Bruteforcer)
          
            (10:38)
          
        
      
- 
        
          
          
            
              Start
              
          
          video20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH)
          
            (10:11)
          
        
      
- 
        
          
          
            
              Start
              
          
          video21 - (SSH & FTP Attacks - Anonymus FTP Login Attack)
          
            (9:55)
          
        
      
- 
        
          
          
            
              Start
              
          
          video22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP)
          
            (17:32)
          
        
      
                            
                           
                          
                        
                        
     
					
- 
        
          
          
            Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
- 
        
          
          
            Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
- 
        
          
          
            Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
- 
        
          
          
            Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
- 
        
          
          
            Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
- 
        
          
          
            Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
- 
        
          
          
            Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
- 
        
          
          
            Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
- 
        
          
          
            Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
- 
        
          
          
            Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
- 
        
          
          
            Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
- 
        
          
          
            Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
- 
        
          
          
            Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
- 
        
          
          
            Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
- 
        
          
          
            Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
- 
        
          
          
            Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
- 
        
          
          
            Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
- 
        
          
          
            Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
- 
        
          
          
            Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
- 
        
          
          
            Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
- 
        
          
          
            Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
- 
        
          
          
            Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Your Instructor
 
								CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Reviews
 
              	 
              	 
              	 
              	 
              	 
              	 
              	 
              	Your Instructor
 
        CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Course Curriculum
- 
        
          
          
            Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
- 
        
          
          
            Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
- 
        
          
          
            Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
- 
        
          
          
            Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
- 
        
          
          
            Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
- 
        
          
          
            Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
- 
        
          
          
            Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
- 
        
          
          
            Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
- 
        
          
          
            Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
- 
        
          
          
            Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
- 
        
          
          
            Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
- 
        
          
          
            Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
- 
        
          
          
            Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
- 
        
          
          
            Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
- 
        
          
          
            Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
- 
        
          
          
            Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
- 
        
          
          
            Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
- 
        
          
          
            Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
- 
        
          
          
            Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
- 
        
          
          
            Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
- 
        
          
          
            Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
- 
        
          
          
            Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Frequently Asked Questions

- Aimee White

I've just finished the third module, the course is awesome, hands on and will really push your skills, up to date examples and will show you a REALLY interesting hacking capabilities in Python. I really recommend this course for anyone in infosec field. - Mike J
 
						 
            
            
           
									 
									 
								 
									 
								 
									 
								


