CYBER SECURITY WITH PYTHON Training Provided by Xplore IT Corp Training Institute in Coimbatore
CYBER SECURITY WITH PYTHON free videos and free material uploaded by Xplore IT Corp Training Institute staff .
Introduction To Python
Scripting
Features
Setting up path
Working with Python scripts
Variables and Data Types in
scripting
Operators
Decision And Loops
If , If- else, Nested if-else
statements
For, While loops
Nested loops
Control Statements
String Manipulation
Accessing Strings
Basic Operations
String slices
Function and Methods
Lists
Accessing list
Operations
Working with lists
Function and Methods
Tuple
Accessing tuples
Operations
Working
Functions and Methods
Dictionaries
Accessing values in dictionaries
Working with dictionaries
Properties
Functions
Functions
Defining a function
Calling a function
Types of functions
Function Arguments
Anonymous functions
Global and local variables
Modules
Importing module
Math module
Random module
Packages
Composition
Input-Output
Printing on screen
Reading data from keyboard
Opening and closing file
Reading and writing files
Functions
Exception-Handling
Exception
Exception Handling
Except clause
Try? finally clause
User Defined Exceptions
OOPs Concepts
Class and object
Attributes
Inheritance
Overloading
Overriding
Data hiding
Regular Expressions
Match function
Search function
Matching VS Searching
Modifiers
Patterns
CGI
Architecture
CGI environment variable
GET and POST methods
Cookies
File upload
Database
Connections
Executing queries
Transactions
Handling error
Networking
Socket
Socket Module
Methods
Client and server
Internet modules
Multithreading
Thread
Starting a thread
Threading module
Synchronizing threads
Multithreaded Priority Queue
GUI Programming
Tkinter Programming
Tkinter widgets
Mail Communication in python
scripts
Developing Hacking Tools Using
Python
Building a network scanner using
python
ARP Scanning
Ping Scan
Building port scanner using python
Python – Nmap
Banner Grabbing
Building Mac Spoofer
WIFI Hacking
WPA2 Attack
WPS Attack
Captive Portal Attack
Building packet grabber using
scapy
Building FTP Brute forcer
Building SSH Botnet
Building Wordlist generator
Building ARP Poisoning
Piloting Man in the Middle attack
Inject infectious Files and
JavaScript codes into
Browsers
Building Advanced key loggers
& malwares
Create Multi-Functioning Reverse
Shell for Backdoors
Building Undetectable Payloads
Uploading Malwares in Anti-virus
scanners
Packing the Malwares into
Undetectable Files
Building Web Crawlers
Grabbing Active GPS Locations From
Mobile Platforms
HTML Injection
Host Header Injection on Live
website
URL Redirections Through Parameter
XML External Entity Attack [XEE]
Welcome to our comprehensive course on PYTHON PROGRAMMING & ETHICAL HACKING. The course assumes you have NO prior knowledge in any of these topics, and by the end of it, you will be at a high intermediate level being able to combine both of these skills to write python programs to hack into computer systems the same way that black hat hackers do. That is not all; you will also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking.
This course is highly practical but it will not neglect the
theory, we will start with the basics of ethical hacking and python programming
and installing the needed software. Then we will dive and start programming
straight away. You will learn everything by example, by writing useful hacking
programs, no boring dry programming lectures.
Write a public review