Learn Python & Ethical Hacking From Scratch

BY
Udemy

Develop from a complete beginner to a fully certified ethical hacker capable of building ethical hacking and security programmes.

Mode

Online

Fees

₹ 599 3499

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

Learn Python & Ethical Hacking From Scratch online certification is a short-term course developed by z Security, a leading provider of ethical hacking and cyber security training, and Zaid Sabih, Ethical Hacker, computer scientist & CEO of z Security and offered by Udemy Inc., a US-based online learning platform.

In Learn Python & Ethical Hacking From Scratch online course, the majority of the topics are taught practically for a better understanding of all the programs and operations. The course is subdivided into several stages, each of which attempts to accomplish a specific goal, which is usually hacking into a specific system. Learners understand the working of a system and also be able to detect its flaws, and learn how to develop a python programme, and develop an algorithm to resolve the issue and implement them using python.

Through Learn Python & Ethical Hacking From Scratch online training, candidates will learn to develop a number of ethical hacking programmes by the end of the course, including backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools, and so on. Interested candidates who wish to enrol for the course have to purchase the lifetime subscription of the course through any online mode of payment. 

The highlights

  • Certificate of completion
  • Self-paced course
  • English videos with multi-language subtitles
  • 25 hours of pre-recorded video content
  • 1 article
  • 14 downloadable resources 
  • Assignments 
  • 30-day money-back guarantee
  • Unlimited access
  • Accessible on mobile devices and TV

Program offerings

  • Certificate of completion
  • Self-paced course
  • English videos with multi-language subtitles
  • 25 hours of pre-recorded video content
  • 1 article
  • Assignments
  • 30-day money-back guarantee
  • Unlimited access
  • 14 downloadable resources

Course and certificate fees

Fees information
₹ 599  ₹3,499
certificate availability

Yes

certificate providing authority

Udemy

Who it is for

What you will learn

Knowledge of python Ethical hacking

After completing the Learn Python & Ethical Hacking From Scratch, the learner will develop the skills in both python programming and ethical hacking, understand how programming and hacking are related to each other, Python 2 & Python 3. Candidates will be skilled to create testing labs to practice their hacking programs, write cross-programs that work on Linux, Windows & OS X, understand about MAC address and how to change it, write object-oriented programs, develop an understanding of working with networks like ARP, DNS, HTTP, etc. Candidates will also learn to analyse and modify HTTP requests and responses, convert HTTPS to HTTP, prevent spoofing attacks, work with TCP, bypass anti-virus, convert malware into trojans, etc.

The syllabus

Introduction

  • Teaser
  • Course Introduction
  • Introduction to Python Programming & Ethical Hacking
  • Lab Overview
  • Initial Preparation
  • Installing Kali Linux as a VM on Windows
  • Installing Kali Linux as a VM on Apple Mac OS
  • Installing Kali Linux as a VM on M1 Apple Computers
  • Installing Kali Linux as a VM on Linux
  • Basic Overview of Kali Linux
  • The Terminal & Linux Commands
  • Python 2 VS Python 3 & Writing Our First Program
  • Installing & Using a Python IDE

Writing a MAC Address Changer - Python Basics

  • What is MAC Address & How To Change it
  • Using Python Modules & Executing System Commands
  • Implementing a Very Basic MAC Changer
  • Variables & Strings
  • Using Variables in MAC Changer
  • Getting Input From The User
  • Handling User Input
  • Handling Command-line Arguments
  • Initialising Variables Based on Command-line Arguments
  • Python Functions
  • Returning Values From Functions
  • Decision Making in Python
  • Using Conditional Statements in MAC Changer

MAC Changer - Algorithm Design

  • Introduction to Algorithms
  • Reading Output Returned By System Commands
  • Introduction to Regular Expressions (Regex)
  • Extracting a Substring Using Regex
  • Refactoring & Housekeeping
  • Implementing The Validation Algorithm
  • Python 3 Compatibility

Programming a Network Scanner

  • Introduction & Teaser
  • Installing Windows as a Virtual Machine
  • Introduction to ARP
  • Designing an Algorithm To Discover Clients on The Same Network
  • Using Scapy To Create an ARP Request
  • Combining Frames To Broadcast Packets
  • Sending & Receiving Packets
  • Introduction Lists in Python
  • Iterating Over Lists & Analysing Packet
  • Using Escape Characters To Improve Program Output
  • Introduction to Dictionaries in Python
  • Improving the Program Using a List of Dictionaries
  • Iterating Over Nested Data Structures
  • Get IP Range Using Command Line Arguments
  • Testing The Network Scanner With Python 3

Writing a APR Spoofer

  • What is ARP Spoofing?
  • Intercepting Data in a Network Using arpspoof
  • Creating an ARP Response
  • Sending ARP Responses
  • Extracting MAC Address From Responses
  • Introduction to Loops in Python
  • More on Loops & Counters
  • Dynamic Printing
  • Exception Handling in Python
  • Implementing a Restore Function
  • Restoring ARP Tables on Exception
  • Fix Dynamic Printing

Writing a Packet Sniffer

  • Introduction & Teaser
  • Sniffing Packets Using Scapy
  • Extracting data From a Specific Layer
  • Analysing Sniffed Packets & Extracting Fields From Layers
  • Analysing Fields & Extracting Passwords
  • Extracting URLs
  • Capturing Passwords From Any Computer Connected to the Same Network
  • Strings & Bytes in Python 3

Writing a DNS Spoofer

  • Intercepting Packets - Creating a Proxy
  • Converting Packets to Scapy Packets
  • Introduction to DNS Spoofing
  • Filtering DNS Responses
  • Analysing & Creating a Custom DNS Response
  • Modifying Packets On The Fly
  • Redirecting DNS Responses
  • Conversion Between Strings & Bytes

Writing a File Interceptor

  • Introduction & Teaser
  • Filtering Traffic Based on the Port Used
  • Analysing HTTP Requests
  • Intercepting HTTP Requests
  • Modifying HTTP Responses on The Fly
  • Intercepting & Replacing Downloads on The Network
  • Testing The File Interceptor With Python 3

Writing Code Injector

  • Introduction & Teaser
  • Analysing HTTP Responses
  • Replacing a Substring Using Regex
  • Decoding HTTP Responses
  • Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
  • Refactoring & Housekeeping
  • Debugging Issues in Python
  • Using Groups & None-capturing Regex
  • Recalculating Content-Length
  • Test The Code Injector With Python 3
  • BeEF Overview & Basic Hook Method
  • Hooking Computers Using code_injector
  • Basic BeEF Commands
  • Delivering Malware Using BeEF

Bypassing HTTPS

  • How to Bypass HTTPS
  • Bypassing HTTPS & Sniffing Login Credentials
  • Replacing Downloads on HTTPS Pages
  • Injecting Code in HTTPS Pages

Writing an ARP Spoof Detector

  • Running Python Programs on Windows
  • Capturing & Analysing ARP Responses
  • Detecting ARP Spoofing Attacks Using Python

Writing Malware

  • Introduction & Teaser
  • Execute System Command Payload
  • Sending Emails Using Python
  • Filtering Command Output Using Regex
  • Stealing WiFi Passwords Saved on a Computer
  • Downloading Files Using Python
  • Writing Files on Disk
  • Password Recovery Basics
  • Stealing Saved Passwords From Remote Computers
  • Interacting With The File System Using Python

Writing Malware- Keylogger

  • Introduction & Teaser
  • Writing a Basic Local Keylogger Using Python
  • Introduction to Global Variables
  • Logging Special Keys
  • Introduction to Threading & Recursion in Python
  • Introduction Object-Oriented Programming
  • Constructor Methods & Instance Variables
  • Logging Key-strikes and Reporting Them By Email

Writing Malware- Backdoors

  • Introduction & Teaser
  • Client-Server Communication & Connection Types
  • Connecting Two Remote Computers Using Sockets
  • Sending & Receiving Data Over TCP
  • Executing System Commands Remotely
  • Implementing a Server
  • Implementing Skeleton For Server - Client Communication
  • Refactoring - Creating a Listener Class
  • Refactoring - Creating a Backdoor Class
  • Serialisation - Theory
  • Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
  • Serialisation - Reliably Sending & Receiving Data
  • Sending Commands as List & Implementing Exit Command
  • Interacting With the File System - Implementing "cd" Command
  • Reading Files Using Python
  • Writing Files Using Python
  • Downloading Files From Hacked Computer
  • Implementing Upload Functionality in Listener
  • Implementing Upload Functionality in Backdoor
  • Handling Unknown Exceptions
  • Using the Backdoor to Hack Windows, Linux & OS X
  • Testing The Backdoor With Python 3.

Writing Malware- Packaging

  • Introduction & Teaser
  • Converting Python Programs To Windows Binary Executables
  • Running Executables Silentely
  • Installing Windows Pyinstaller on Linux
  • Packaging Programs For Windows From Linux
  • Introduction to Persistence
  • Running Programs on Startup
  • Creating a Basic Trojan Using Download & Execute Payload
  • Creating a Trojan By Embedding Files In Program Code
  • Bypassing Anti-Virus Programs - Theory
  • Bypassing Anti-Virus Programs - Practical
  • Adding an Icon to Generated Executables
  • Spoofing File Extension
  • Converting Python Programs To OS X Executables
  • Converting Python Programs to Linux Executables

Website/Web Application Hacking

  • Introduction & Teaser
  • What is a Website
  • How to Hack a Website

Website Hacking - Writing a Crawler

  • Sending GET Requests To Web Servers
  • Discovering Website Subdomains Using Python
  • Discovering Hidden Paths in Websites
  • Reading Response Content
  • Extracting Useful Data From Response
  • Filtering Results
  • Extracting Unique Links & Storing Them In a List
  • Recursively Discovering All Paths On a Target Website
  • Testing The Crawler With Python 3

Writing a Program To Guess Login Information

  • Sending Post Requests to Websites
  • Guessing Login Information on Login Pages
  • Test The Program With Python 3

Writing a Vulnerability Scanner

  • Introduction & Teaser
  • HTTP Requests - POST VS GET
  • Parsing HTML Code Using Python
  • Extracting HTML Attributes
  • Posting Forms
  • Building Basic Structure For a Vulnerability Scanner
  • Using Default Parameters
  • Sending Requests in a Session
  • Extracting & Submitting Forms Automatically
  • Implementing a Method To Run The Scanner
  • Discovering XSS Vulnerabilities
  • Exploiting XSS Vulnerabilities
  • Implementing Code To Discover XSS in Forms
  • Implementing Code To Discover XSS in Parameters
  • Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
  • Test The Vulnerability Scanner With Python 3

Bonus Section

  • Bonus Lecture - What's Next??

Instructors

Mr Zaid Sabih
Ethical Hacker
Udemy

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books