Nov 14, 2024
Python 101 for Hackers

What you’ll learn

  • The difference between Python2 and Python3

  • How to install, setup and configure a Python environment

  • Fundamental Python programming concepts

  • Python programming concepts useful for solving hacking and automation tasks

  • How to leverage and extend Python using common and hacking focused modules

  • Practical examples demonstrating how to perform brute forcing, password cracking and SQL injections using Python

  • The importance of documenting and commenting your work

  • Recommendations to continue mastering Python moving forward as a hacker

Requirements

  • Patience and a willingness to learn

  • A computing environment (Windows, Linux, Mac) with at least 8GB of RAM and 20GB of disk space

  • Prior virtualization (Virtual Box) knowledge preferred

Description

The Python 101 for Hackers course teaches an introduction to Python programming and concepts, with a focus on techniques, modules and examples which are useful for a hacker. No prior Python programming knowledge is required to be successful in this introductory course.

Students should take this Python 101 for Hackers course if they are interested in:

  • Understanding fundamental Python programming concepts, required to automate common hacking and bug bounty related tasks

  • Learning how to identify and mitigate Python programming errors which may occur when attempting to execute code snippets or proof of concept (PoC) scripts

  • Bridging the gap between generic programming concepts and practical hacking applications such as password cracking, web login brute forcing or exploitation of SQL injections

The following concepts will be taught in this course:

  • The difference between Python2 and Python3, and how to leverage both as hacking and automation tools

  • How to install, setup and configure a Python environment in Kali Linux with Virtual Box

  • Fundamental programming concepts: variables, data types, string formatting, booleans, operators, tuples, lists, dictionaries, sets conditionals, functions and loops

  • Python programming concepts useful for solving hacking and automation tasks: reading files, writing files, handling user input, exception and error handling, comprehensions and lambdas

  • How to leverage and extend Python using common and hacking focused modules

  • Practical examples demonstrating how to perform SSH login brute forcing, SHA256 password cracking, web login form brute forcing and SQL injection exploitation using Python

  • Understanding the importance of documenting and commenting your work and recommendations to continue mastering Python and programming moving forward

Who this course is for:

  • Information security professionals and students, looking to expand their technical skillset

SALES PAGE

DOWNLOAD LINK

RAR password: XDJ

Recently uploaded