Learn Python & Ethical Hacking From Scratch
Write 20+ hacking programs to learn hacking & programming at the same time | No prior knowledge required
4.68 (19189 reviews)
119,666
students
25 hours
content
Mar 2024
last update
$159.99
regular price
What you will learn
180+ videos (25 hours) on Python programming & ethical hacking
Write over 20 hacking and security programs
Learn 2 topics at the same time - Python programming & Ethical Hacking
No programming, hacking or Linux knowledge required
Write programs in Python 2 and 3
Write cross platform programs that work on Windows, Apple Mac OS & Linux
Have a deep understanding on how computer systems work
Install hacking lab & needed software (on Windows, Apple Mac OS and Linux)
Start from 0 up to a high-intermediate level
Learn by example, by writing exciting programs
Model problems, design solutions & implement them using Python
Have a strong base & use the skills learned to write any program even if its not related to hacking
Understand what is Hacking, what is Programming, and why are they related
Design a testing lab to practice hacking & programming safely
Interact & use the Linux terminal
Understand what MAC address is & how to change it
Write a python program to change MAC address
Use Python modules and libraries
Understand Object Oriented Programming
Write object oriented programs
Model & design extendable programs
Write a program to discover devices connected to the same network
Read, analyse & manipulate network packets
Understand & interact with different network layers such as ARP, DNS, HTTP ....etc
Write a program to redirect the flow of packets in a network (ARP spoofer)
Write a packet sniffer to filter interesting data such as usernames and passwords
Write a program to redirect DNS requests (DNS Spoofer)
Intercept and modify network packets on the fly
Write a program to replace downloads requested by any computer on the network
Analyse & modify HTTP requests and responses
Inject code in HTML pages loaded by computers on the same network
Downgrade HTTPS to HTTP
Write a program to detect ARP Spoofing attacks
Write payloads to download a file, execute command, download & execute, download execute & report .....etc
Use sockets to send data over TCP
Send data reliably over TCP
Write client-server programs
Write a backdoor that works on Windows, Apple Mac OS and Linux
Implement features in the backdoor such as file system access, upload and download files and persistence
Write a remote keylogger that can register all keystrikes and send them by Email
Interact with files using python (read, write & modify)
Convert python programs to binary executables that work on Windows, OS X and Linux
Convert malware to torjans that work and function like other file types like an image or a PDF
Bypass Anti-Virus Programs
Understand how websites work, the technologies used and how to test them for weaknesses
Send requests towebsites and analyse responses
Write a program that can discover hidden paths in websites
Write a program that can map websites and discover all links, subdomains, files and directories
Extract and submit forms using python
Run dictionary attacks and guess login information on login pages
Analyse HTML using Python
Interact with websites using Python
Write a program that can discover vulnerabilities in websites
Why take this course?
¡Claro! El curso de Zaid Sabih y zSecurity que describes ofrece un enfoque completo y práctico sobre las habilidades de hacking, desde la configuración de un laboratorio de penetración hasta el desarrollo de programas para realizar diversas actividades maliciosas. A continuación, resumiré los puntos clave y los objetivos del curso:
**Objetivos del Curso:**
1. **Configuración de un Laboratorio de Penetración:** Aprender a configurar un entorno seguro para practicar hacking.
2. **Instalación de Sistemas Operativos:** Instalar Kali Linux y Windows como virtuales en cualquier sistema operativo host.
3. **Conocimientos Básicos de Linux:** Dominar el uso del terminal y los comandos básicos en Linux.
4. **Comprender las Redes:** Aprender cómo funcionan las redes, cómo se comunican los clientes y el comportamiento de los protocolos de capa 2 y superior.
5. **Protocolo ARP (Address Resolution Protocol):** Entender cómo funciona ARP y cómo explotarlo.
6. **DNS (Domain Name System) y HTTP(S):** Conocer el funcionamiento de DNS y HTTP/HTTPS, y cómo estos pueden ser manipulados.
7. **Programación en Sockets y Transferencia de Datos TCP:** Aprender a crear conexiones de red utilizando sockets y transferir datos de manera segura o no segura.
8. **Funcionamiento de los Sitios Web:** Comprender cómo funcionan los sitios web, las solicitudes GET y POST y cómo se puede explotar.
**Actividades Maliciosas Aprender:**
1. **Hacking de Network Hacking:** Utilizar herramientas para interceptar o modificar tráfico en redes locales.
12. **Man-in-the-Middle (MitM) Attacks:** Aprender a interceptar y possibly alter communication between two parties who think they are communicating directly.
13. **Social Engineering:** Entender cómo manipular a persona para obtener información sensible o confidencial.
14. **Creación de Programas Hacking:** Desarrollar herramientas y técnicas de hacking desde cero.
15. **Desarrollo y Uso de Exploits y Payloads:** Aprender cómo escribir y ejecutar códigos que explotan vulnerabilidades en software o hardware.
16. **Cifrado (Cryptography) y Cuerpo (Body) de Datos:** Comprender los fundamentos del cifrado y cómo proteger o robar datos sensibles o confidales.
17. **Explotación de Vulnerabilidades en Sitios Web:** Aprender a encontrar y explotear vulnerabilidades en sitios web para obtener información sensible o confidencial o toman control total sobre esos sistemas.
18. **Creación de un Vulnerability Scanner (Escáner de Vulnerabilidad):** Desarrollar una herramienta que pueda identificar vulnerabilidades en sitios web.
**Habilidades y Conceptos a Aprender:**
1. **Linux Terminal Basics:** Comandos básicos para trabajar con Linux desde el terminal.
2. **Network Layers:** Entender cómo se organizan las capas de una red.
3. **Hypertext Transfer Protocol (HTTP) y HTTPS:** Conocer cómo funcionan los sitios web, incluyendo cómo HTTPS protege los datos.
4. **Antivirus Program Work:** Comprender cómo funcionan los programas antivirus y cómo se pueden evad.
5. **Sockets and TCP Transfer:** Conocer cómo se transfican los datos a través de sockets utilizando el protocolo TCP.
6. **How Webs Work (Cómo Funcionan los Sitios Web):** Comprender cómo se construyen y se pueden manipular.
7. **Wordlist Attack:** Utilizar listas de palabras para adivinar contraseñas o soluciones de problemas sensibles o confidales.
8. **Vulnerability Scanning and Reporting (Escaneo y reporte de Vulnerabilidades):** Aprender a escanear y informar sobre las debilidades de seguridad de un sitio web.
9. **Cryptography Basics:** Comprender los conceptos básicos del cifrado.
10. **Web Application Hacking:** Hacer hacking en aplicación web, incluyendo la manipulación de solicitudes GET y POST.
**Notas Importantes:**
- El curso es de naturaleza educativa y fue creado por Zaid Sabih y zSecurity. Ningún otro organización está asociada con este curso.
- El curso está diseñado para fines educativas y de hacking de carácter malvado. Todos los ataques descritos se deben realizar en un laboratorio propio o con permiso expreso.
- El curso es para fines educativas y de carácter malvado, y se ofre a través de Udemy. No está asociado con ningún certificado de otro organismo.
Este curso es de naturaleza práctica y está diseñado para aquellos interesados en aprender sobre el hacking desde cero hasta desarrollar sus propias herramientas y técnicas maliciosas de manera segura y legalmente permisible. Asegúrate de seguir las mejores prácticas y de mantenerte dentro del mar de la ética en hacking.
Recuerda que este curso es para aprender y practicar sobre el hacking de manera responsable y legalmente permitida, siempre respetuosamente y responsablemente. No olvid que el hacking es una disciplina que requiere una comprenión clara y justa del arte de la computación (InfoSec: **Hacking & Computing**).
Screenshots
Our review
🌟 **Course Review: Python & Ethical Hacking** 🌟
### Course Overview
The Python and Ethical Hacking course, taught by Zaid, has received a global rating of 4.71. Recent reviews reflect a mix of positive feedback for the instructor's expertise and course content, along with some concerns regarding the updating of code examples to align with current programming standards. The course is highly recommended for its comprehensive coverage of Python in the context of ethical hacking, with many learners appreciating Zaid's clear teaching style and supportive community.
### Pros
- **Instructor Expertise**: Zaid is consistently praised for his knowledge and ability to teach complex subjects in an accessible manner.
- **Clear Narrative and Explanation**: The course material is well-organized with a clear narrative that helps learners understand the concepts being taught.
- **Real-World Application**: The course provides practical, hands-on experience that can be directly applied to ethical hacking tasks.
- **Supportive Learning Environment**: Learners report that Zaid and the community are supportive and helpful when troubleshooting issues or understanding complex topics.
- **Comprehensive Content**: The course covers Python comprehensively, making it valuable for beginners and those looking to expand their skills in Python for hacking.
- **Engaging Material**: Many learners find the course engaging and interesting, often leading them to develop a keen interest in ethical hacking and cybersecurity.
- **Value for Money**: The effort put into setting up lab environments and resources is acknowledged as being worth the investment compared to other courses.
### Cons
- **Outdated Code**: Some reviews mention that the code provided in the course may be outdated, particularly with references to Python 2. Learners suggest that this could lead to confusion or frustration when attempting to implement these codes in a modern environment.
- **Lack of Updated Content**: Despite some positive reports, there is an expectation for more frequent updates to the course content to ensure relevance and accuracy in the rapidly evolving field of cybersecurity.
- **No Immediate Access to Code**: Some learners found it helpful if code were provided, as they felt that rewatching videos and taking notes could have been supplemented with direct access to the code for quicker reference.
- **Community Support Issues**: A few learners reported that community support was not always responsive or directly addressing their questions.
### Additional Notes
- **Python 3 Adoption**: It has been noted that Zaid has updated the modules within his class sessions to include Python 3, which has been well received by learners.
- **Ethical Considerations**: The course places a strong emphasis on the ethical aspects of hacking, which is highly commended by learners.
- **Community Feedback**: Learners who completed the course and those who are currently enrolled often interact within the course's community, sharing their experiences and supporting each other.
### Conclusion
Overall, the Python & Ethical Hacking course offered by Zaid is a solid educational resource for anyone interested in ethical hacking and Python programming. Despite some shortcomings regarding the timeliness of code updates, the course remains highly recommended for its depth, breadth, and the quality of instruction provided. It is clear that with updates to ensure content relevance and a few improvements in community support, this course could be even more beneficial to aspiring cybersecurity professionals.
Charts
Price
Rating
Enrollment distribution
Coupons
Submit by | Date | Coupon Code | Discount | Emitted/Used | Status |
---|---|---|---|---|---|
Ignacio Castro | 11/26/2021 | 795E87F391EDB77F5C42 | 92% OFF | expired |
Related Topics
1527300
udemy ID
1/26/2018
course created date
5/16/2019
course indexed date
Bot
course submited by