Python for Automating Information Security
Python for Automating Information Security, available at $34.99, has an average rating of 3.15, with 36 lectures, 7 quizzes, based on 20 reviews, and has 207 subscribers.
You will learn about Read and modify exploit scripts so they can be used in a real penetration test Analyze a packet capture file to look for network traffic anomalies Collect open-source intelligence (OSINT) to speed up the passive-intelligence-gathering phase of a penetration test Analyze a log file for suspicious activity Write a Python replacement for Netcat that can be used for many purposes including obtaining a shell after a successful exploit Collect packets of the wire for use in live network traffic analysis Develop your first penetration-testing tool This course is ideal for individuals who are If you are a security professional, a networking enthusiast, or just plain curious in understanding how networks and packets work internally, then this course is for you! It is particularly useful for If you are a security professional, a networking enthusiast, or just plain curious in understanding how networks and packets work internally, then this course is for you!.
Enroll now: Python for Automating Information Security
Summary
Title: Python for Automating Information Security
Price: $34.99
Average Rating: 3.15
Number of Lectures: 36
Number of Quizzes: 7
Number of Published Lectures: 36
Number of Published Quizzes: 7
Number of Curriculum Items: 43
Number of Published Curriculum Objects: 43
Original Price: $109.99
Quality Status: approved
Status: Live
What You Will Learn
- Read and modify exploit scripts so they can be used in a real penetration test
- Analyze a packet capture file to look for network traffic anomalies
- Collect open-source intelligence (OSINT) to speed up the passive-intelligence-gathering phase of a penetration test
- Analyze a log file for suspicious activity
- Write a Python replacement for Netcat that can be used for many purposes including obtaining a shell after a successful exploit
- Collect packets of the wire for use in live network traffic analysis
- Develop your first penetration-testing tool
Who Should Attend
- If you are a security professional, a networking enthusiast, or just plain curious in understanding how networks and packets work internally, then this course is for you!
Target Audiences
- If you are a security professional, a networking enthusiast, or just plain curious in understanding how networks and packets work internally, then this course is for you!
The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.
In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!
By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.
About the Author
Thomas McNeela is an experienced information security professional and continuing-education instructor. Over his nine-year career, he has worked for several companies including Motorola Mobility and U.S. Cellular.
Thomas specializes in network engineering and security, security assessments, threat intelligence, and automation. He earned a Master of Science (M.S.) degree in Information Systems from Northwestern University and holds many industry-recognized certifications including the CISSP and CEH (Master), and is currently working for information security software and services firm located in the Chicago area.
Course Curriculum
Chapter 1: Reading, Modifying, and Testing an Exploit Script
Lecture 1: The Course Overview
Lecture 2: Setting Up Your Virtual Environment
Lecture 3: Finding an Exploit Script
Lecture 4: Understanding the Script
Lecture 5: Modifying the Script
Lecture 6: Testing the Script
Chapter 2: Analyzing a Packet Capture File
Lecture 1: Viewing a Packet Capture File in Wireshark
Lecture 2: Understanding Normal Traffic Patterns
Lecture 3: Writing a Python Script to Look for Malicious Network Traffic
Lecture 4: Writing a Python Script to Calculate a Network Traffic Baseline
Lecture 5: Writing a Python Script to Compare a Baseline Against Network Traffic
Chapter 3: Gathering Open-Source Intelligence
Lecture 1: What OSINT Is
Lecture 2: Enumerating Domain Names with Python
Lecture 3: What Is Google Dorking
Lecture 4: Automating Google Dorking with Python
Lecture 5: Web Directory Enumeration with Python
Chapter 4: Analyzing a Log File
Lecture 1: Reading a Log File
Lecture 2: Understanding Normal Log Messages
Lecture 3: Writing a Python Script to Look for Logs Indicating Malicious Activity
Lecture 4: Writing a Python Script to Calculate a Log Message Baseline
Lecture 5: Writing a Python Script to Compare a Baseline Against a Log File
Chapter 5: Writing a Python Replacement for Netcat
Lecture 1: What Is Netcat?
Lecture 2: Writing the Input Arguments
Lecture 3: Writing the Client
Lecture 4: Writing the Server
Lecture 5: Testing Your Program
Chapter 6: Collecting Network Packets Off the Wire
Lecture 1: Introduction to Passive Network Capture
Lecture 2: Writing a Python Packet Sniffer
Lecture 3: Capturing Plain-Text Credentials from Network Packets with Python
Lecture 4: Introduction to ARP Cache Poisoning
Lecture 5: Writing a Python ARP Cache Poisoner
Chapter 7: Building a Penetration Testing Tool
Lecture 1: Introduction to the Metasploit Framework
Lecture 2: Writing the Discovery Module
Lecture 3: Writing the Exploit Framework
Lecture 4: Stitching It All Together with an Interactive Command Shell
Lecture 5: Testing MSFPY
Instructors
-
Packt Publishing
Tech Knowledge in Motion
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 1 votes
- 3 stars: 5 votes
- 4 stars: 5 votes
- 5 stars: 6 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024