[ FreeCourseWeb.com ] Python for Automating Information Security
Download More Latest Courses Visit -->> https://FreeCourseWeb.com
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
May 28, 2020 | ISBN: 9781838828219 | English
Duration: 36 Lessons (2h 38m) | Size: 509 MB
Learn how to use the Python programming language to automate offensive and defensive information security tasks
Learn
Read and modify exploit scripts so they can be used in a real penetration test
Analyze a packet capture file to look for network traffic anomalies
Collect open-source intelligence (OSINT) to speed up the passive-intelligence-gathering phase of a penetration test
Analyze a log file for suspicious activity
Write a Python replacement for Netcat that can be used for many purposes including obtaining a shell after a successful exploit
Collect packets of the wire for use in live network traffic analysis
Develop your first penetration-testing tool
About
The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.
In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!
By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.
Use Winrar to Extract. And use a shorter path when extracting, such as C: drive
ALSO ANOTHER TIP: You Can Easily Navigate Using Winrar and Rename the Too Long File/ Folder Name if Needed While You Cannot in Default Windows Explorer. You are Welcome ! :)
Download More Latest Courses Visit -->> https://FreeCourseWeb.com
Get Latest Apps Tips and Tricks -->> https://AppWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
|
udp://opentor.org:2710/announce udp://p4p.arenabg.com:1337/announce udp://tracker.torrent.eu.org:451/announce udp://tracker.cyberia.is:6969/announce udp://9.rarbg.to:2710/announc udp://exodus.desync.com:6969/announce udp://explodie.org:6969/announce udp://tracker.moeking.me:6969/announce udp://tracker.opentrackr.org:1337/announce udp://tracker.tiny-vps.com:6969/announce udp://ipv4.tracker.harry.lu:80/announce udp://tracker.coppersurfer.tk:6969/announce udp://tracker.leechers-paradise.org:6969/announce udp://open.stealth.si:80/announce udp://tracker.pirateparty.gr:6969/announce |