17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] PacktPub - Python For Automating Information Security [Video]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.
In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!
By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.
All the code and supporting files for this course are available on GitHub at: https://github.com/PacktPublishing/Python-for-Automating-Information-Security
Author
Thomas McNeela
Thomas McNeela is an experienced information security professional and continuing-education instructor. Over his nine-year career, he has worked for several companies including Motorola Mobility and U.S. Cellular. Thomas specializes in network engineering and security, security assessments, threat intelligence, and automation. He earned a Master of Science (M.S.) degree in Information Systems from Northwestern University and holds many industry-recognized certifications including the CISSP and CEH (Master), and is currently working for information security software and services firm located in the Chicago area.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help our Group!.txt
208 B
1 - Reading, Modifying, and Testing an Exploit Script/01 - The Course Overview.mp4
13.5 MB
1 - Reading, Modifying, and Testing an Exploit Script/02 - Setting Up Your Virtual Environment.mp4
11.2 MB
1 - Reading, Modifying, and Testing an Exploit Script/03 - Finding an Exploit Script.mp4
9.9 MB
1 - Reading, Modifying, and Testing an Exploit Script/04 - Understanding the Script.mp4
11.5 MB
1 - Reading, Modifying, and Testing an Exploit Script/05 - Modifying the Script.mp4
19.2 MB
1 - Reading, Modifying, and Testing an Exploit Script/06 - Testing the Script.mp4
14 MB
2 - Analyzing a Packet Capture File/07 - Viewing a Packet Capture File in Wireshark.mp4
20.4 MB
2 - Analyzing a Packet Capture File/08 - Understanding Normal Traffic Patterns.mp4
17 MB
2 - Analyzing a Packet Capture File/09 - Writing a Python Script to Look for Malicious Network Traffic.mp4
17.8 MB
2 - Analyzing a Packet Capture File/10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp4
22.1 MB
2 - Analyzing a Packet Capture File/11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp4
18 MB
3 - Gathering Open-Source Intelligence/12 - What OSINT Is.mp4