Stone River Elearning – Complete Ethical Hacking Course 2.0: Python & Kali Linux
Learn network penetration testing, ethical hacking using the amazing programming language, Python along with Kali Linux!
- The first half of the course is all about Python Introduction and Advanced training
- The second half of the course is all about Penetration Testing using Python code
What you’ll learn
- Become proficient with Python programming – Introduction and Advanced
- Learn how to install a Virtual Box (Machine) for Kali Linux
- Understand what a penetration tester really does
- Learn about Various tools for penetration testing
- Learn how to install Kali Linux in Windows Machine from Scratch – Step-by-Step
- Create Python programs to seek vulnerabilities on the network system
- Explore various tools using Kali Linux
Are there any course requirements or prerequisites?
- You need to be tech savvy
- You also need a fast internet connection
- A minimum of 8 GB RAM on your computer is recommended
Who this course is for:
- This course is for complete beginners
- Intermediate and advanced users can also enroll to learn tips and techniques
Course Curriculum
- Welcome! (2:53)
- Why Program (14:12)
- Downloading Python (10:43)
- Python Interpreter And Idle (14:22)
- Nuts And Bolts Of A Sample Program (14:57)
- Python Strings (18:09)
- Getting Input (17:09)
- Reading And Writing Files – Part 1 (8:52)
- Reading And Writing Files – Part 2 (12:16)
- Python Expressions (13:00)
- Creating Your First Program – Part 1 (11:52)
- Creating Your First Program – Part 2 (14:19)
- Placing Comments In Code (11:53)
- Introduction To Strings – Part 1 (10:02)
- Introduction To Strings – Part 2 (10:01)
- What Are Functions (19:03)
- Print Function (5:19)
- Escape Codes (10:52)
- Input Function (18:40)
- Global Variables (8:46)
- Concept Of Dictionaries (16:55)
- Concepts Of Lists (16:10)
- What Are Tuples (13:48)
- Introduction To Loops – Part 1 (12:09)
- Introduction To Loops – Part 2 (9:10)
- Working With Graphics (10:25)
- Conditional Execution (9:56)
- If Statement (14:29)
- Additional If Statements (12:15)
- The While Loop (13:49)
- Project A (18:19)
- Project B (13:42)
- Conclusion (2:51)
- ETHICAL HACKING – Introduction (5:04)
- What Is Penetration Testing (8:25)
- Five Phases of Penetration Testing (6:51)
- Building A Web Server (16:51)
- Installing Virtual Box (5:06)
- Downloading And Installing Kali Linux (14:51)
- Downloading Python Kali Linux (7:43)
- Installing Wing Ide Editor (7:02)
- First Penetration Program Using Python (15:24)
- TCP Client in Python (7:49)
- TCP Service in Python (7:28)
- Raw Binary Packets (7:35)
- Port Scanning Using Nmap (15:24)
- Sniffing – Part 1 (5:06)
- Sniffing – Part 2 (16:11)
- SQL Injection – Part 1 (16:38)
- SQL Injection – Part 2 (15:31)
- SQL Injection – Part 3 (11:56)
- SQL Injection – Part 4 (10:09)
- Brute Force – Part 1 (16:00)
- Brute Force – Part 2 (10:32)
- Course Conclusion (2:29)
- Download Files here
Sale Page: https://stoneriverelearning.com/p/the-complete-ethical-hacking-course-2-0-python-kali-linux
Archive: https://archive.ph/wip/xMg7A
Reviews
There are no reviews yet.