HOME > IT & Software > Python Programming Cybersecurity Web AttacksHacking

Python Programming Cybersecurity Web AttacksHacking

SynopsisPython Programming & Cybersecurity – Web Attacks/Ha...
Python Programming Cybersecurity Web AttacksHacking  No.1

Python Programming & Cybersecurity – Web Attacks/Hacking, available at $74.99, has an average rating of 4.2, with 87 lectures, based on 35 reviews, and has 341 subscribers.

You will learn about Careers in Python Programming Python Basics HTTP Basics Kali Linux Basics Web Attacks Web Attacks using Python This course is ideal for individuals who are Beginner Python or Curious about Web Attacks or Curious about Penetration Testing It is particularly useful for Beginner Python or Curious about Web Attacks or Curious about Penetration Testing.

Enroll now: Python Programming & Cybersecurity – Web Attacks/Hacking

Summary

Title: Python Programming & Cybersecurity – Web Attacks/Hacking

Price: $74.99

Average Rating: 4.2

Number of Lectures: 87

Number of Published Lectures: 87

Number of Curriculum Items: 87

Number of Published Curriculum Objects: 87

Original Price: $24.99

Quality Status: approved

Status: Live

What You Will Learn

  • Careers in Python Programming
  • Python Basics
  • HTTP Basics
  • Kali Linux Basics
  • Web Attacks
  • Web Attacks using Python
  • Who Should Attend

  • Beginner Python
  • Curious about Web Attacks
  • Curious about Penetration Testing
  • Target Audiences

  • Beginner Python
  • Curious about Web Attacks
  • Curious about Penetration Testing
  • Welcome to Python Programming & Cybersecurity – Web Attacks

    In this course will be focusing on Python, Web Vulnerabilities and Web Attacks/Hacking.

    The approach of this course is to learn Web Technologies,  then understand how we apply automation Web Attack automation using Python scripts.

    Learn the basics of Python and web vulnerabilities based on OWASP Top 10 !  This course provides you at least 30 python sample scripts design for aspiring Web Application Firewall specialist and Web Application Penetration Testers

    The course consist of whiteboarding discussions and lots of hands-on lab demonstrations.

    The lab includes Kali Linux which is attackers and couple of target websites that we will hack. One is PHP Hack it Auction Site and Sytx Show Blog/Vlog web site.

    This is course also prepares student for F5 303 ASM Specialist Exam. The course requires you to have not just F5 BIG-IP knowledge but also understand the concepts of web technologies, different web vulnerabilities and web attacks

    Target Audience

    Python Programmers (Aspiring)

    Web Application Specialist

    F5 ASM/Adv WAF Specialist

    Security Engineers

    Penetration Testers

    Expectations

    Will cover basic Python

    Will cover basic HTTP

    Will cover basic web attacks

    You won’t become a professional Hacker

    Need to learn many things

    Software Technologies

    Linux – Kali, Ubuntu

    Docker

    Python 3.X

    Web Applications – HackIT Auction and Styx Show Blog/Vlog site

    Sections

    Introduction

    F5 BIG-IP, Python and Docker Security Lab

    Python Programming

    Python Basics

    Web Technologies Basics

    Web Application Vulnerabilities

    Python for Web Applications

    Web Attacks using Python Scripts

    Completion

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Course Introduction

    Lecture 2: About the Course

    Lecture 3: About the Instructor

    Lecture 4: Course Flow

    Chapter 2: F5 BIG-IP, Python and Docker Security Lab

    Lecture 1: Python and Docker Security Lab Overview

    Lecture 2: Python Web Security Lab Resources

    Lecture 3: Python Web Security Topology

    Lecture 4: Python Web Security Lab Details

    Lecture 5: NEW – AWS EC2 Hacking Website

    Chapter 3: Python Programming

    Lecture 1: Python Programming Overview

    Lecture 2: Introduction to Python

    Lecture 3: Careers in Python Programming

    Lecture 4: CyberSecurity

    Lecture 5: Web Application Attacks

    Chapter 4: Python Basics

    Lecture 1: Python Basics Overview

    Lecture 2: Python Concepts

    Lecture 3: Executing Python

    Lecture 4: String

    Lecture 5: Integers

    Lecture 6: List

    Lecture 7: List vs Tuples

    Lecture 8: Dictionaries

    Lecture 9: Python Basic Demo Part 1

    Lecture 10: Python Basics Demo Part 2

    Lecture 11: Booleans and Conditions

    Lecture 12: Conditional Statement

    Lecture 13: Loops

    Lecture 14: Python Basic Demo Part 3

    Lecture 15: Input

    Lecture 16: Function

    Lecture 17: Modules

    Lecture 18: Project 1

    Lecture 19: Project 1 Demo

    Lecture 20: Project 2

    Lecture 21: Project 2 Demo

    Chapter 5: Web Technologies Basics

    Lecture 1: Web Technologies Basics and Lab Overview

    Lecture 2: Network and Internet

    Lecture 3: HTTP Basics

    Lecture 4: Demo – HTTP Basics

    Lecture 5: HTTP Connections

    Lecture 6: Demo – HTTP Connections

    Lecture 7: Web Development Stack

    Lecture 8: Demo – Web Development Stack

    Lecture 9: HTTP Messages

    Lecture 10: Demo – HTTP Messages

    Lecture 11: HTTP Basics and Status Codes

    Lecture 12: Demo – HTTP Status Codes

    Lecture 13: Web Forms – HTTP Methods

    Lecture 14: Web Forms – Fields and Selections

    Lecture 15: Demo – Web Forms

    Chapter 6: Web Application Vulnerabilities

    Lecture 1: Web Attacks Basics and Lab Overview

    Lecture 2: Open Web Application Security Project (OWASP)

    Lecture 3: Parameter Tampering

    Lecture 4: Demo – Parameter Tampering

    Lecture 5: Hidden Field Manipulation

    Lecture 6: Demo – Hidden Field Manipulation

    Lecture 7: Forceful Browsing

    Lecture 8: Demo – Forceful Browsing

    Lecture 9: Sensitive Data Exposure

    Lecture 10: Demo – Sensitive Data Exposure

    Lecture 11: SQL Injection

    Lecture 12: Demo – SQL Injection

    Lecture 13: Broken Authentication & Session Management

    Chapter 7: Python Automation for Web Applications

    Lecture 1: Python Automation for Web Applications and Lab Overview

    Lecture 2: Python Revisit

    Lecture 3: Demo – Python Revisit

    Lecture 4: Python Web Modules

    Lecture 5: Demo – Python Web Modules

    Lecture 6: Find Function

    Lecture 7: Demo – Find Function

    Lecture 8: Automating Web Registration

    Lecture 9: Demo -Automating Web Registration

    Lecture 10: Automating Web Log in

    Lecture 11: Demo – Automating Web Log in

    Lecture 12: Accessing Files

    Lecture 13: Demo – Accessing Files

    Chapter 8: Web Attacks using Python Scripts

    Lecture 1: Web Attacks using Python Scripts and Lab Overview

    Lecture 2: Cross Site Scripting (XSS)

    Lecture 3: Demo – Cross Site Scripting (XSS)

    Lecture 4: Broken Access Control / IDOR

    Lecture 5: Demo – Broken Access Control / IDOR

    Lecture 6: Brute Force Attack

    Lecture 7: Demo – Brute Force Attack

    Chapter 9: Completion

    Lecture 1: Wrap Up

    Lecture 2: Moving On

    Lecture 3: Message from the Instructor

    Lecture 4: Course Completion

    Instructors

  • Python Programming Cybersecurity Web AttacksHacking  No.2
    Dean Armada
    Founder and Chief Architect
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 1 votes
  • 3 stars: 2 votes
  • 4 stars: 5 votes
  • 5 stars: 24 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!