17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Python For Ethical Hackers And Cyber Security Engineers
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Become an Ethical Hacker and Cyber Security Analyst, and build your own hacking tools using Python Scripting
What you'll learn
Python scripting and Ethical hacking
Write your own hacking tools using python
Build a strong foundation in networking protocols
Build a strong foundation in cryptography
Learn the OSI model, data encapsulation and how network packets are constructed and transferred from one machine to another
Write you own python script to spoof your MAC address
Dive Deep into ARP protocol and build a network scanner to discover live hosts
Acquire a comprehensive understanding of the IP and ICMP protocol
Lean how to build your own hacking tool to trace route an IP address
Learn the TCP protocol, how an connection is established during a TCP handshake and the type of TCP packets
Dive Deep into TCP port Scanning techniques like SYN_SCAN, ACK_SCAN and FIN_SCAN
Write a python script to scan TCP ports
Lean data encoding, hashing and encryption
Build a password cracker in python, to retrieve a password from a given hashing
build your hacking tool to encrypt and decrypt data using AES algorithm
Implement an Hybrid Encryption in python, by generating an RSA private and public keys and encrypting the AES session Key
Learn the fundamentals about Bind Shell and Reverse Shell
write your own Bind Shell in python language
write your own reverse Shell in python language
Requirements
No programming experience or cyber security knowledge is required
Basic IT knowledge in computer systems
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Python For Ethical Hackers and Cyber Security Engineers Introduction.mp4
27.8 MB
~Get Your Files Here !/1. Introduction/2. Networking fundamentals.mp4
23.6 MB
~Get Your Files Here !/1. Introduction/3. OSI Model.mp4
19.6 MB
~Get Your Files Here !/1. Introduction/4. Data Encapsulation.mp4
14.5 MB
~Get Your Files Here !/1. Introduction/5. Packet Flow.mp4
25 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/1. A deep dive inside the ARP protocol.mp4
14.7 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/2. ARP Scan and Man In The Middle Attack.mp4
16.9 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/3. A deep dive inside the Ethernet frame.mp4
29.4 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/4. Hacking the ARP Header.mp4
38.6 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/5. Spoofing our MAC address using python.mp4
55.4 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/6. Scanning the network and discovering live hosts using python.mp4
52.6 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/1. Deep Dive inside the IP Protocol - Part 1.mp4
22.9 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/2. Deep Dive inside the IP Protocol - Part 2.mp4
24.4 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/3. Deep Dive inside the IP Protocol - Part 3.mp4
30.1 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/4. Deep Dive inside the ICMP Protocol - Part 1.mp4
32.4 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/5. Deep Dive inside the ICMP Protocol - Part 2.mp4
27.2 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/6. Trace routing an IP Address using python - Part 1.mp4
19.2 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/7. Trace routing an IP Address using python - Part 2.mp4
16 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/8. Trace routing an IP Address using python - Part 3.mp4
76.7 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/1. Introduction to TCP Protocol.mp4
21 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/10. Discovering open ports using python - Part 3.mp4
75.3 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/11. Discovering open ports using python - Part 4.mp4
24.3 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/12. Discovering open ports using python - Part 5.mp4
22.8 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/13. Discovering open ports using python - Part 6.mp4
32.5 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/14. Discovering open ports using python - Part 7.mp4
56.2 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/2. TCP Handshake in details.mp4
16.7 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/3. TCP Port Scanning Techniques - Part 1.mp4
38.7 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/4. TCP Port Scanning Techniques - Part 2.mp4
37.9 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/5. Hacking the TCP Header - Part 1.mp4
20.6 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/6. Hacking the TCP Header - Part 2.mp4
24.2 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/7. Hacking the TCP Header - Part 3.mp4
27.8 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/8. Discovering open ports using python - Part 1.mp4
35.2 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/9. Discovering open ports using python - Part 2.mp4
68.5 MB
~Get Your Files Here !/5. Bind Shell and Reverse Shell/1. Shell fundamentals.mp4
18.8 MB
~Get Your Files Here !/5. Bind Shell and Reverse Shell/2. Bind Shell and Reverse Shell fundamentals.mp4
27.5 MB
~Get Your Files Here !/5. Bind Shell and Reverse Shell/3. Write a Bind Shell using python.mp4
43.8 MB
~Get Your Files Here !/5. Bind Shell and Reverse Shell/4. Write a Reverse Shell using python.mp4
16.5 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/1. Encoding and Hashing fundamentals.mp4
18.6 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/10. AES Encryption using python - Part 2.mp4
46 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/11. AES Encryption using python - Part 3.mp4
103.1 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/12. Hybrid Encryption (AES & RSA) using python - Part 1.mp4
22.2 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/13. Hybrid Encryption (AES & RSA) using python - Part 2.mp4
28.4 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/14. Hybrid Encryption (AES & RSA) using python - Part 3.mp4
36.2 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/15. Hybrid Encryption (AES & RSA) using python - Part 4.mp4
46.6 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/2. Encryption Fundamentals.mp4
31.7 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/3. Hybrid Encryption.mp4
22.5 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/4. Building a Password Hash Cracker using python - Part 1.mp4
31 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/5. Building a Password Hash Cracker using python - Part 2.mp4
70.4 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/6. Building a Password Hash Cracker using python - Part 3.mp4
44.1 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/7. Building a Password Hash Cracker using python - Part 4.mp4
134.9 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/8. Building a Password Hash Cracker using python - Part 5.mp4
130.3 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/9. AES Encryption using python - Part 1.mp4