Python Ethical Hacking : Build tools for ethical hacking

Go to class
Write Review

Python Ethical Hacking : Build tools for ethical hacking provided by Udemy is a comprehensive online course, which lasts for 10 hours worth of material. Python Ethical Hacking : Build tools for ethical hacking is taught by Fahad Sarwar. Upon completion of the course, you can receive an e-certificate from Udemy. The course is taught in Englishand is Paid Course. Visit the course page at Udemy for detailed price information.

Overview
  • Learn hacking with Python by building your own tools

    What you'll learn:

    • Introduction to basics of computer networks
    • What is hacking
    • How to stay anonymous
    • Learn how to track IP location
    • Create your own undetectable malware
    • Execute system commands on the victim machine using backdoor
    • Download and upload files to victim machine
    • How to create a Trojan
    • How to steal wifi passwords stored on the PC
    • How to intercept, manipulate and craft network packets
    • How to perform man in the middle attack
    • Crack password protected zipped files
    • Build your own undetectable key logger
    • Create a botnet with a command and control center
    • How to protect yourself online

    Python is one of the most used programming language in the world and its significance can't be ignored. Python has gained immense popularity recently owing to its performance in various fields like machine learning, data science, data analytics and cyber security. This course is designed in python to make ethical hacking easier for students since python is one of the most easy programming languages to learn. The concepts used in this course are fairly simple and anyone with some knowledge of computer science can try this course.

    In this course we will learn following topics:

    1. Introduction to basics of computer networks

    2. What is hacking

    3. How to stay anonymous

    4. Learn how to track IP location

    5. Create your own undetectable malware

    6. Execute system commands on the victim machine using backdoor

    7. Download and upload files to victim machine

    8. How to create a Trojan

    9. How to steal wifi passwords stored on the PC

    10. How to intercept, manipulate and craft network packets

    11. How to perform man in the middle attack

    12. Crack password protected zipped files

    13. Build your own undetectable key logger

    14. Create a botnet with a command and control center

    15. How to protect yourself online