We will cover the following topics in this course:
How to setup a Kali Linux system
Essential Linux system commands
How to create a secure penetration testing environment
Website penetration testing
WPA2 wireless network cracking
Man in the middle attacks
Python programming fundamentals
Writing our own pen-testing tools (reverse shell, keylogger and bruteforcer)
Tips for building a career in cyber security
This course was designed for absolute beginners, so no previous ethical hacking or programming knowledge is necessary. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the tutorials is available within the discussion forum.
Thank you for taking the time to read this and we hope to see you in the course!
Hello everyone and welcome to our Python programming course for beginners. Before we begin with the actual coding, let us talk about a few things such as who this course is for, and what we will be doing in this course. If you enjoy this tutorial, you can get the complete course for only $9.99!
First of all, we will be using Python 3 in this course. The reason why we are using Python 3 is because Python 2 will no longer be supported in 2020. Therefore, what we want to learn is Python 3 programming, which is similar to Python 2. If you have experience with Python 2, the syntax is rather similar. We will cover the changes between 2 and 3 throughout this course.
We are going to use Python 3, as I said, because it is the version that will be used going forward. Every Python 2 platform will need to be updated to Python 3, and therefore we are going to download and use Python 3.
Let us talk a bit about who this course is best suited for. If you are a student and you would like to learn Python programming, this will be the perfect course for you. We will cover everything from the very basics of programming to more advanced concepts later on. If you would like to make this your career and become a Python developer, you can take this course and you will learn a lot from it.
The Python language is useful for several different applications, such as web development, scripting, networking, automation, etc. We will cover all of these areas with coding demonstrations.
We will begin this course by downloading Python 3 for our Windows 10 machine. I will show you how to setup Python in Ubuntu Linux and Mac OS, but we will be mostly coding in the Windows 10 environment. I will be running an Ubuntu virtual machine, which we will use later on in the networking section, where we are going need two machines to communicate with one another. However, we will do most of our coding in the Windows 10 environment.
So that will be about it for this introduction to Python. In the next lecture I will explain a bit about Python, and we’re going to also download Python 3 for our Windows 10 environment.
I hope you enjoyed this tutorial and I hope I see you in the next one. Bye!
Hello everybody and welcome to the beginning of our new Python for ethical hacking course. In this Udemy course we will be coding our own penetration testing tools. If this is your first ethical hacking course, I’ll be sure to make this course beginner friendly, and explain everything as we go. For a limited time, you can enroll in the complete course on Udemy for only $9.99!
We’ll start off by installing our environment and setting up our Kali Linux machine. If you are not a beginner and have watched other ethical hacking courses, you probably already have the Kali Linux machine installed. If so, you can skip the introductory part and go right into the coding section.
What we will be doing in this course, as it says, is we will be coding our own tools that we will use for ethical hacking attacks. Most ethical hacking courses consist of scanning, enumeration, exploitation, backdoors, keyloggers, bruteforcers and many other attacks on the websites. There are many other activities covered as well, but most are performed with tools created by other people. What we want to do is actually code some of our own tools and make them useful for our future attacks. We will begin with coding a port scanner. We will try to create something similar to nmap. We will start off our attack by scanning the port, scanning the target and checking out the banners for the versions of software running on the target system. Then we will proceed to actual exploitation and attacking, brute forcing SSH, brute forcing FTP and on other protocols as well.
We will also code a reverse shell. If you’re coming from my previous ethical hacking course, you probably already have an idea of what a reverse shell is, since I covered it in that course. We will build off of what we coded in the previous course, as well as add additional functionality in this one. Now if you didn’t take my previous course don’t worry. I will cover everything in great detail for those of you who unfamiliar with both ethical hacking and Python.
I will not actually be showing you how to code in Python. This is not a Python course. I will, however, explain everything as we go through and code our own tools. Since teaching you how to code in Python would consume too much of our time, I will explain to you everything that we are doing in great detail. So, don’t worry even if you don’t have any previous experience. You can still attend this course and learn a lot from it.
Now, as I said, we will begin by creating our virtual environment. We will use VirtualBox and Kali Linux for this purpose. The Kali Linux machine is where we will run our attacks, where we will code our own tools, where we will compile them and run them.
You can code on Windows or MAC if you wish. If you have Python installed on another system, you can actually code all of these tools in that environment. If we run into something that can’t be run on a Windows environment, I will make sure to actually say that before we start coding. I would advise you to download Kali Linux if you wish to follow this course. For those of you who don’t have it installed, I will show you how you can download and setup a Kali Linux machine.
So, that’ll be about it for this introductory post. I hope you will enjoy this course and I hope you learn a lot from it. Please use it for your own purposes, as long as they are on the legal side. Please don’t use this information for anything that isn’t legal, such as scanning targets you do not own, attacking targets you do not have permission to attack, or basically anything that is illegal.
So, that would be about it for this post. I hope I see you in the next lecture where I’ll show you how you can download VirtualBox, the newest version, and Kali Linux 2019. I hope you enjoy this preview video and I hope I see you in the course!
If you would like to master ethical hacking in 2019, you are going to LOVE this course! Learn ethical hacking and penetration testing while working on practical Python coding projects. Enroll now for the lowest price of $9.99!
We will cover the following topics in this course:
Introduction and setup
Port and vulnerability scanning
SSH and FTP attacks
Sniffers, flooders and spoofers
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
This course is also available in the following bundles!