Cyber Security - Python and Web Applications
- Description
- Curriculum
- FAQ
- Reviews
*** Course updated 10/30/2018 (always kept up-to-date) ***
Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist – not just in theory – but in practice.
Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.
There is NO platform dependency in this course – You can use any platform you choose – Windows, MacOS and Linux.
No prior experience required with Python or any of the topics covered in this course – There is a Python crash course included!
This course covers the fundamental building blocks of your required skill set – some key items include:
Vulnerability Analysis
Building and Publishing Security Tools – Dynamic web app security scanner, Password hashing and encrypt tool among many others!
Security Scanning
Phishing Protection
Web Application Vulnerability Mitigation
Password Complexity Analysis
Antivirus Evasion Remediation
Multi-Factor Authentication
Network Traffic Analysis
Cloud Security
Ethical Hacking
Web Reconnaissance
Wireless Access Point Protection
Programming with Python
We also cover the biggest threats in the information technology world today, including:
Botnets
Code Exploits
Sensitive Data Exposure
SQL Injection
Social Engineering
Cross-Site Scripting
Port Scanning
and many more!
You will get lifetime access to over 100 lectures and 11 hours of video lectures plus corresponding text guides for the lectures!
This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you’ll get your money back, no questions asked!
So what are you waiting for? Learn Cyber Security, Python for Cyber Security and Web Application Security in a way that will advance your career and increase your knowledge, all in a fun and practical way!
-
1Introduction
Welcome to the course!
-
2Course Work Overview
An overview of what we will be covering in this course and how it is structured.
-
3Sample Tool 1 - Log Analyzer
We take a look at a quick example of a log analysis security tool.
This is the kind of tool that you will be able to build using Python once you finish this course.
We will use https://repl.it/ for this example.
-
4Sample Tool 1 - Text Instructions
The code for the log analyzer tool. Be sure to download the access.log file from the lecture resources to try as your sample input.
-
5Sample Tool 2 - Password Checker
We take a look at another security tool, this time it is a password checker.
You will be able to easily build Python tools like these once you finish this course.
We will use the https://haveibeenpwned.com API for this example.
-
6Sample Tool 2 - Text Instructions
-
7Development Environment Overview
We go over the development environment that we will be using for this course.
repl.it is at https://repl.it/
-
8Important course updates (don't skip)
We will add latest updates relating to the course in this text
-
9Cyber Security: Introduction to Section 2
An introductory look at what is covered in section 2
-
10What is Cyber Security?
We explore what is meant by cyber security in the modern world and what actually comprises the work of a cyber security professional.
-
11Cyber Security Introduction Quiz
-
12Explaining the methodology
We will review the methodology of cyber security professionals.
-
13Methodology Quiz
-
14Intro to Python and Python crash course (section 7) for beginners
In this brief text summary we will talk about Python and the crash course that's available as a bonus in section 7
-
15repl.it Introduction
An overview of repl.it and how to use Python with this great, free tool
-
16Basics Review
-
17Penetration Testing - Overview
Penetration Testing is a key practice for cyber security professionals. Here we go over the basics of what it is and the variables involved.
-
18Penetration Testing Quiz
-
19Penetration Testing - Code Example
-
20Penetration Testing - Text Instructions
-
21Penetration Testing - Remediation
-
22Port Scanning - Overview
-
23Port Scanning Quiz
-
24Port Scanning - Code Example
-
25Port Scanning - Text Instructions
-
26Port Scanning - Remediation
-
27Botnets - Overview
As the number of Internet-connected devices continue to grow, botnets are a dominant cause for concern in today's cyber security and information technology landscape. This is an overview of what they are and how they work, including an explanation of DDoS attacks.
-
28Botnets - Code Example
-
29Botnets - Code Example Continued
-
30Botnets - Text Instructions
-
31Botnets - Remediation
-
32Cyber Security Topics Review 1
-
33Code Exploits - Overview
-
34Code Exploits - Code Example
-
35Code Exploits - Text Instructions
-
36Code Exploits - Remediation
-
37Forensic Investigation - Overview
-
38Forensic Investigation - Code Example
-
39Forensic Investigation - Text Instructions
-
40Forensic Investigation - Remediation
-
41Network Traffic Analysis - Overview
-
42Network Traffic Analysis - Code Example
-
43Network Traffic Analysis - Text Instructions
-
44Network Traffic Analysis - Remediation
-
45Cyber Security Topics Review 2
-
46Wireless - Overview
-
47Wireless - Code Example
-
48Wireless - Text Instructions
-
49Wireless - Remediation
-
50Web Reconnaissance - Overview
-
51Web Reconnaissance - Code Example
-
52Web Reconnaissance - Text Instructions
-
53Web Reconnaissance - Remediation
-
54Antivirus Evasion - Overview
We explore the topic of antivirus evasion and how an application can bypass an antivirus scan.
-
55Antivirus Evasion - Code Example
-
56Antivirus Evasion - Text Instructions
-
57Antivirus Evasion - Remediation
-
58Social Engineering - Overview
We take a look at the various non-technical ways in which attackers can get sensitive information and compromise information systems.
-
59Social Engineering - Code Example
-
60Social Engineering - Text Instructions
-
61Social Engineering - Remediation
-
62Cyber Security Topics Review 3
-
63Assignment 1 - Log Analysis