Video description
Learn how to use the Python programming language to automate offensive and defensive information security tasks
About This Video
- Learn individual information security techniques using Python
- Use several powerful pre-built Python libraries for your own purposes
- Build real information security tools in Python!
In Detail
The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.
In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!
By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.
Audience
If you are a security professional, a networking enthusiast, or just plain curious in understanding how networks and packets work internally, then this course is for you!
Requirements: Beginner to intermediate-level Python proficiency recommended, Oracle VirtualBox, Kali Linux, Metasploitable 2 and PyCharm IDE in your Kali system.
Publisher resources
Table of contents
- Chapter 1 : Reading, Modifying, and Testing an Exploit Script
- Chapter 2 : Analyzing a Packet Capture File
- Chapter 3 : Gathering Open-Source Intelligence
- Chapter 4 : Analyzing a Log File
- Chapter 5 : Writing a Python Replacement for Netcat
- Chapter 6 : Collecting Network Packets Off the Wire
- Chapter 7 : Building a Penetration Testing Tool
Product information
- Title: Python for Automating Information Security
- Author(s):
- Release date: May 2020
- Publisher(s): Packt Publishing
- ISBN: 9781838828219
You might also like
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
video
The Complete Ethical Hacking Course
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools …