Learn Python & Ethical Hacking From Scratch
Learn Python & Ethical Hacking From Scratch, available at $159.99, has an average rating of 4.63, with 184 lectures, based on 19734 reviews, and has 123838 subscribers.
You will learn about 180+ videos (25 hours) on Python programming & ethical hacking Write over 20 hacking and security programs Learn 2 topics at the same time – Python programming & Ethical Hacking No programming, hacking or Linux knowledge required Write programs in Python 2 and 3 Write cross platform programs that work on Windows, Apple Mac OS & Linux Have a deep understanding on how computer systems work Install hacking lab & needed software (on Windows, Apple Mac OS and Linux) Start from 0 up to a high-intermediate level Learn by example, by writing exciting programs Model problems, design solutions & implement them using Python Have a strong base & use the skills learned to write any program even if its not related to hacking Understand what is Hacking, what is Programming, and why are they related Design a testing lab to practice hacking & programming safely Interact & use the Linux terminal Understand what MAC address is & how to change it Write a python program to change MAC address Use Python modules and libraries Understand Object Oriented Programming Write object oriented programs Model & design extendable programs Write a program to discover devices connected to the same network Read, analyse & manipulate network packets Understand & interact with different network layers such as ARP, DNS, HTTP ….etc Write a program to redirect the flow of packets in a network (ARP spoofer) Write a packet sniffer to filter interesting data such as usernames and passwords Write a program to redirect DNS requests (DNS Spoofer) Intercept and modify network packets on the fly Write a program to replace downloads requested by any computer on the network Analyse & modify HTTP requests and responses Inject code in HTML pages loaded by computers on the same network Downgrade HTTPS to HTTP Write a program to detect ARP Spoofing attacks Write payloads to download a file, execute command, download & execute, download execute & report …..etc Use sockets to send data over TCP Send data reliably over TCP Write client-server programs Write a backdoor that works on Windows, Apple Mac OS and Linux Implement features in the backdoor such as file system access, upload and download files and persistence Write a remote keylogger that can register all keystrikes and send them by Email Interact with files using python (read, write & modify) Convert python programs to binary executables that work on Windows, OS X and Linux Convert malware to torjans that work and function like other file types like an image or a PDF Bypass Anti-Virus Programs Understand how websites work, the technologies used and how to test them for weaknesses Send requests towebsites and analyse responses Write a program that can discover hidden paths in websites Write a program that can map websites and discover all links, subdomains, files and directories Extract and submit forms using python Run dictionary attacks and guess login information on login pages Analyse HTML using Python Interact with websites using Python Write a program that can discover vulnerabilities in websites This course is ideal for individuals who are Anybody interested in learning Python programming or Anybody interested in learning ethical hacking / penetration testing It is particularly useful for Anybody interested in learning Python programming or Anybody interested in learning ethical hacking / penetration testing.
Enroll now: Learn Python & Ethical Hacking From Scratch
Summary
Title: Learn Python & Ethical Hacking From Scratch
Price: $159.99
Average Rating: 4.63
Number of Lectures: 184
Number of Published Lectures: 184
Number of Curriculum Items: 191
Number of Published Curriculum Objects: 191
Original Price: $189.99
Quality Status: approved
Status: Live
What You Will Learn
- 180+ videos (25 hours) on Python programming & ethical hacking
- Write over 20 hacking and security programs
- Learn 2 topics at the same time – Python programming & Ethical Hacking
- No programming, hacking or Linux knowledge required
- Write programs in Python 2 and 3
- Write cross platform programs that work on Windows, Apple Mac OS & Linux
- Have a deep understanding on how computer systems work
- Install hacking lab & needed software (on Windows, Apple Mac OS and Linux)
- Start from 0 up to a high-intermediate level
- Learn by example, by writing exciting programs
- Model problems, design solutions & implement them using Python
- Have a strong base & use the skills learned to write any program even if its not related to hacking
- Understand what is Hacking, what is Programming, and why are they related
- Design a testing lab to practice hacking & programming safely
- Interact & use the Linux terminal
- Understand what MAC address is & how to change it
- Write a python program to change MAC address
- Use Python modules and libraries
- Understand Object Oriented Programming
- Write object oriented programs
- Model & design extendable programs
- Write a program to discover devices connected to the same network
- Read, analyse & manipulate network packets
- Understand & interact with different network layers such as ARP, DNS, HTTP ….etc
- Write a program to redirect the flow of packets in a network (ARP spoofer)
- Write a packet sniffer to filter interesting data such as usernames and passwords
- Write a program to redirect DNS requests (DNS Spoofer)
- Intercept and modify network packets on the fly
- Write a program to replace downloads requested by any computer on the network
- Analyse & modify HTTP requests and responses
- Inject code in HTML pages loaded by computers on the same network
- Downgrade HTTPS to HTTP
- Write a program to detect ARP Spoofing attacks
- Write payloads to download a file, execute command, download & execute, download execute & report …..etc
- Use sockets to send data over TCP
- Send data reliably over TCP
- Write client-server programs
- Write a backdoor that works on Windows, Apple Mac OS and Linux
- Implement features in the backdoor such as file system access, upload and download files and persistence
- Write a remote keylogger that can register all keystrikes and send them by Email
- Interact with files using python (read, write & modify)
- Convert python programs to binary executables that work on Windows, OS X and Linux
- Convert malware to torjans that work and function like other file types like an image or a PDF
- Bypass Anti-Virus Programs
- Understand how websites work, the technologies used and how to test them for weaknesses
- Send requests towebsites and analyse responses
- Write a program that can discover hidden paths in websites
- Write a program that can map websites and discover all links, subdomains, files and directories
- Extract and submit forms using python
- Run dictionary attacks and guess login information on login pages
- Analyse HTML using Python
- Interact with websites using Python
- Write a program that can discover vulnerabilities in websites
Who Should Attend
- Anybody interested in learning Python programming
- Anybody interested in learning ethical hacking / penetration testing
Target Audiences
- Anybody interested in learning Python programming
- Anybody interested in learning ethical hacking / penetration testing
Last Update: May 2024
Welcome to my comprehensive course on python programming and ethical hacking. The course assumes you have NO prior knowledge in any of these topics, and by the end of it you’ll be at a high intermediate level being able to combine both of these skills to write python programs to hack computer systems exactly the same way that black hat hackers do. That’s not all, you’ll also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking.
This course is highly practical but it won’t neglect the theory, we’ll start with basics of ethical hacking and python programming and installing the needed software. Then we’ll dive and start programming straight away. You’ll learn everything by example, by writing useful hacking programs, no boring dry programming lectures.
The course is divided into a number of sections, each aims to hack a specific system! You’ll first learn how this system works and its weaknesses, then you’ll lean how to write a python program to exploit these weaknesses and hack it. As we write the program I will teach you python programming from scratch covering one topic at a time. By the end of the course you’re going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools and the list goes on. You’ll also have a deep understanding on how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python .
As mentioned in this course you will learn both ethical hacking and programming at the same time, here are some of the topics that will be covered in the course:
Programming topics:
-
Programming in python 2 and 3.
-
Using modules and libraries.
-
Variables, types, etc.
-
Handling user input.
-
Reading and writing files .
-
Functions .
-
Loops .
-
Data structures.
-
Regex.
-
Decision making.
-
Recursion.
-
Threading.
-
Object oriented programming.
-
Packet manipulation using scapy.
-
Netfilterqueue.
-
Socket programming.
-
String manipulation.
-
Exceptions.
-
Serialisation.
-
Compiling programs to binary executables.
-
Sending & receiving HTTP requests.
-
Parsing HTML.
-
+ more!
Hacking topics:
-
Basics of network hacking / penetration testing .
-
Changing MAC address & bypassing filtering .
-
Network mapping.
-
ARP Spoofing – redirect the flow of packets in a network.
-
DNS Spoofing – redirect requests from one website to another.
-
Spying network devices / clients.
-
Analysing network traffic such as usernames, passwords, visited urls, etc.
-
Inject code in pages loaded by computerd connected to the same network.
-
Replace files on the fly as they get downloaded by computers on the same network.
-
Detect ARP spoofing attacks.
-
Bypass HTTPS.
-
Create malware for Windows, Apple Mac OS and Linux.
-
Create trojans for Windows, Apple Mac OS and Linux.
-
Hack Windows, Apple Mac OS and Linux using custom backdoors.
-
Bypass Anti-Virus programs.
-
Steal credentials using fake prompts .
-
Display fake updates .
-
Use own keylogger to spy on everything typed on Windows & Linux.
-
Basics of website hacking / penetration testing .
-
Discover subdomains .
-
Discover hidden files and directories in a website .
-
Run wordlist attacks to guess login information .
-
Discover and exploit XSS vulnerabilities .
-
Discover weaknesses in websites using own vulnerability scanner.
Programs you’ll build in this course:
You’ll learn all the above by implementing the following hacking programs
-
mac_changer – changes MAC Address to anything we want .
-
network_scanner – scans network and discovers the IP and MAC address of connected clients.
-
arp_spoofer – runs an ARP spoofing attack to redirect the flow of packets in the network allowing us to intercept data.
-
packet_sniffer – filters intercepted data and displays usernames, passwords, visited links, etc.
-
dns_spoofer – redirects DNS requests, eg: redirects requests to from one domain to another.
-
file_interceptor – Intercepts downloads and replaces them with any file we want .
-
code_injector – injects code in intercepted HTML pages.
-
arpspoof_detector – detects ARP spoofing attacks.
-
execute_command payload – executes a system command on the computer it gets executed on.
-
execute_and_report payload – executes a system command and reports result via email .
-
download_and_execute payload – downloads a file and executes it on target system .
-
download_execute_and_report payload – downloads a file, executes it, and reports result by email .
-
reverse_backdoor – gives remote control over the system it gets executed on, allows us to
-
Access file system.
-
Execute system commands .
-
Download & upload files.
-
-
keylogger – records key-strikes and sends them to us by email.
-
crawler – discovers hidden paths on a target website .
-
discover_subdomains – discovers subdomains on target website .
-
spider – maps the whole target website and discovers files, directories and links.
-
guess_login – runs a wordlist attack to guess login information.
-
vulnerability_scanner – scans a target website for weaknesses and produces a report with all findings .
As you build the above you’ll learn:
-
Setting up a penetration testing lab to practice hacking safely.
-
Installing Kali Linux and Windows as virtual machines inside ANY operating system.
-
Linux Basics .
-
Linux terminal basics .
-
How networks work .
-
How clients communicate in a network.
-
Address Resolution Protocol – ARP .
-
Network layers.
-
Domain Name System – DNS .
-
Hypertext Transfer Protocol – HTTP .
-
HTTPS .
-
How anti-virus programs work .
-
Sockets.
-
Connecting devices over TCP .
-
Transferring data over TCP .
-
How website work .
-
GET & POST requests.
-
And more!
Checkout the curriculum and the course teaser for more info!
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Notes:
-
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
-
This course is totally a product of Zaid Sabih & zSecurity, no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Teaser
Lecture 2: Course Introduction
Lecture 3: Introduction to Python Programming & Ethical Hacking
Lecture 4: Initial Overview
Lecture 5: Initial Preparation
Lecture 6: Installing Kali Linux as a VM on Windows
Lecture 7: Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)
Lecture 8: Installing Kali Linux as a VM on Linux
Lecture 9: Basic Overview of Kali Linux
Lecture 10: The Terminal & Linux Commands
Lecture 11: Python 2 VS Python 3 & Writing Our First Program
Lecture 12: Installing & Using a Python IDE
Chapter 2: Writing a MAC Address Changer – Python Basics
Lecture 1: What is MAC Address & How To Change it
Lecture 2: Using Python Modules & Executing System Commands
Lecture 3: Implementing a Very Basic MAC Changer
Lecture 4: Variables & Strings
Lecture 5: Using Variables in MAC Changer
Lecture 6: Getting Input From The User
Lecture 7: Handling User Input
Lecture 8: Handling Command-line Arguments
Lecture 9: Initialising Variables Based on Command-line Arguments
Lecture 10: Python Functions
Lecture 11: Returning Values From Functions
Lecture 12: Decision Making in Python
Lecture 13: Using Conditional Statements in MAC Changer
Chapter 3: MAC Changer – Algorithm Design
Lecture 1: Introduction to Algorithms
Lecture 2: Reading Output Returned By System Commands
Lecture 3: Introduction to Regular Expressions (Regex)
Lecture 4: Extracting a Substring Using Regex
Lecture 5: Refactoring & Housekeeping
Lecture 6: Implementing The Validation Algorithm
Lecture 7: Python 3 Compatibility
Chapter 4: Programming a Network Scanner
Lecture 1: Introduction & Teaser
Lecture 2: Installing Windows as a Virtual Machine
Lecture 3: Installing Windows as a Virtual Machine on Apple Silicon Computers
Lecture 4: Introduction to ARP
Lecture 5: Designing an Algorithm To Discover Clients on The Same Network
Lecture 6: Using Scapy To Create an ARP Request
Lecture 7: Combining Frames To Broadcast Packets
Lecture 8: Sending & Receiving Packets
Lecture 9: Introduction Lists in Python
Lecture 10: Iterating Over Lists & Analysing Packet
Lecture 11: Using Escape Characters To Improve Program Output
Lecture 12: Introduction to Dictionaries in Python
Lecture 13: Improving the Program Using a List of Dictionaries
Lecture 14: Iterating Over Nested Data Structures
Lecture 15: Testing The Network Scanner With Python 3
Chapter 5: Writing an ARP Spoofer
Lecture 1: What is ARP Spoofing?
Lecture 2: Intercepting Data in a Network Using arpspoof
Lecture 3: Creating an ARP Response
Lecture 4: Sending ARP Responses
Lecture 5: Extracting MAC Address From Responses
Lecture 6: Introduction to Loops in Python
Lecture 7: More on Loops & Counters
Lecture 8: Dynamic Printing
Lecture 9: Exception Handling in Python
Lecture 10: Implementing a Restore Function
Lecture 11: Restoring ARP Tables on Exception
Chapter 6: Writing a Packet Sniffer
Lecture 1: Introduction & Teaser
Lecture 2: Sniffing Packets Using Scapy
Lecture 3: Extracting data From a Specific Layer
Lecture 4: Analysing Sniffed Packets & Extracting Fields From Layers
Lecture 5: Analysing Fields & Extracting Passwords
Lecture 6: Extracting URLs
Lecture 7: Capturing Passwords From Any Computer Connected to the Same Network
Lecture 8: Strings & Bytes in Python 3
Chapter 7: Writing a DNS Spoofer
Lecture 1: Intercepting Packets – Creating a Proxy
Lecture 2: Converting Packets to Scapy Packets
Lecture 3: Introduction to DNS Spoofing
Lecture 4: Filtering DNS Responses
Lecture 5: Analysing & Creating a Custom DNS Response
Lecture 6: Modifying Packets On The Fly
Lecture 7: Redirecting DNS Responses
Chapter 8: Writing a File Interceptor
Lecture 1: Introduction & Teaser
Lecture 2: Filtering Traffic Based on the Port Used
Lecture 3: Analysing HTTP Requests
Lecture 4: Intercepting HTTP Requests
Lecture 5: Modifying HTTP Responses on The Fly
Lecture 6: Intercepting & Replacing Downloads on The Network
Chapter 9: Writing a Code Injector
Lecture 1: Introduction & Teaser
Lecture 2: Analysing HTTP Responses
Lecture 3: Replacing a Substring Using Regex
Lecture 4: Decoding HTTP Responses
Lecture 5: Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
Lecture 6: Refactoring & Housekeeping
Lecture 7: Debugging Issues in Python
Lecture 8: Using Groups & None-capturing Regex
Instructors
-
Zaid Sabih
Ethical Hacker, Computer Scientist & CEO of zSecurity -
z Security
Leading provider of ethical hacking and cyber security training,
Rating Distribution
- 1 stars: 113 votes
- 2 stars: 163 votes
- 3 stars: 1145 votes
- 4 stars: 5658 votes
- 5 stars: 12658 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple