YoVDO

Python Ethical Hacking : Build tools for ethical hacking

Offered By: Udemy

Tags

Ethical Hacking Courses Python Courses File Management Courses Password Cracking Courses

Course Description

Overview

Learn hacking with Python by building your own tools

What you'll learn:
  • Introduction to basics of computer networks
  • What is hacking
  • How to stay anonymous
  • Learn how to track IP location
  • Create your own undetectable malware
  • Execute system commands on the victim machine using backdoor
  • Download and upload files to victim machine
  • How to create a Trojan
  • How to steal wifi passwords stored on the PC
  • How to intercept, manipulate and craft network packets
  • How to perform man in the middle attack
  • Crack password protected zipped files
  • Build your own undetectable key logger
  • Create a botnet with a command and control center
  • How to protect yourself online

Python is one of the most used programming language in the world and its significance can't be ignored. Python has gained immense popularity recently owing to its performance in various fields like machine learning, data science, data analytics and cyber security. This course is designed in python to make ethical hacking easier for students since python is one of the most easy programming languages to learn. The concepts used in this course are fairly simple and anyone with some knowledge of computer science can try this course.

In this course we will learn following topics:

  1. Introduction to basics of computer networks

  2. What is hacking

  3. How to stay anonymous

  4. Learn how to track IP location

  5. Create your own undetectable malware

  6. Execute system commands on the victim machine using backdoor

  7. Download and upload files to victim machine

  8. How to create a Trojan

  9. How to steal wifi passwords stored on the PC

  10. How to intercept, manipulate and craft network packets

  11. How to perform man in the middle attack

  12. Crack password protected zipped files

  13. Build your own undetectable key logger

  14. Create a botnet with a command and control center

  15. How to protect yourself online


Taught by

Fahad Sarwar

Related Courses

Design Computing: 3D Modeling in Rhinoceros with Python/Rhinoscript
University of Michigan via Coursera
A Practical Introduction to Test-Driven Development
LearnQuest via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Bioinformatics Databases with Biopython
Coursera Project Network via Coursera
Accounting Data Analytics
University of Illinois at Urbana-Champaign via Coursera