Cyber Security - Python and Web Applications
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!
*** Course updated 10/30/2018 (always kept up-to-date) ***
Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist - not just in theory - but in practice.
Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php.
There is NO platform dependency in this course - You can use any platform you choose - Windows, MacOS and Linux.
No prior experience required with Python or any of the topics covered in this course - There is a Python crash course included!
This course covers the fundamental building blocks of your required skill set - some key items include:
Vulnerability Analysis
Building and Publishing Security Tools - Dynamic web app security scanner, Password hashing and encrypt tool among many others!
Security Scanning
Phishing Protection
Web Application Vulnerability Mitigation
Password Complexity Analysis
Antivirus Evasion Remediation
Multi-Factor Authentication
Network Traffic Analysis
Cloud Security
Ethical Hacking
Web Reconnaissance
Wireless Access Point Protection
Programming with Python
We also cover the biggest threats in the information technology world today, including:
Botnets
Code Exploits
Sensitive Data Exposure
SQL Injection
Social Engineering
Cross-Site Scripting
Port Scanning
and many more!
You will get lifetime access to over 100 lectures and 11 hours of video lectures plus corresponding text guides for the lectures!
This course comes with a 30 day money back guarantee! If you are not satisfied in any way, you'll get your money back, no questions asked!
So what are you waiting for? Learn Cyber Security, Python for Cyber Security and Web Application Security in a way that will advance your career and increase your knowledge, all in a fun and practical way!
Khu vực Câu hỏi thường gặp trống
Cyber Security: Introduction to Section 2
Xem trướcWhat is Cyber Security?
Explaining the methodology
Xem trướcRepl.it Introduction
Penetration Testing - Overview
Penetration Testing - Code Example
Penetration Testing - Remediation
Xem trướcPort Scanning - Overview
Port Scanning - Code Example
Port Scanning - Remediation
Xem trướcBotnets - Overview
Botnets - Code Example
Botnets - Code Example Continued
Xem trướcBotnets - Remediation
Code Exploits - Overview
Code Exploits - Code Example
Code Exploits - Remediation
Forensic Investigation - Overview
Forensic Investigation - Code Example
Forensic Investigation - Remediation
Network Traffic Analysis - Overview
Network Traffic Analysis - Code Example
Network Traffic Analysis - Remediation
Wireless - Overview
Wireless - Code Example
Wireless - Remediation
Web Reconnaissance - Overview
Web Reconnaissance - Code Example
Web Reconnaissance - Remediation
Antivirus Evasion - Overview
Antivirus Evasion - Code Example
Antivirus Evasion - Remediation
Social Engineering - Overview
Social Engineering - Code Example
Social Engineering - Remediation
Cyber Security Introduction Quiz
Methodology Quiz
Intro to Python and Python crash course (section 7) for beginners
Basics Review
Penetration Testing Quiz
Penetration Testing - Text Instructions
Port Scanning Quiz
Port Scanning - Text Instructions
Botnets - Text Instructions
Cyber Security Topics Review 1
Code Exploits - Text Instructions
Forensic Investigation - Text Instructions
Network Traffic Analysis - Text Instructions
Cyber Security Topics Review 2
Wireless - Text Instructions
Web Reconnaissance - Text Instructions
Antivirus Evasion - Text Instructions
Social Engineering - Text Instructions
Cyber Security Topics Review 3
Assignment 1 - Log Analysis
Introduction to Section 3 - Building your own tool with Python
Tool Development with Python - Overview
Introduction to Pip
Basic Python Script
Command Line Arguments
Argument Parsing
Validating Input
Sending Requests to the Web
Parsing Results
Checking Forms
Generating the Report
Checking Comments
Checking Inputs
Improving the Report
Configuration from File
Using Config Settings
Merging the Configs
Outputting the Report
Pushing to GitHub
Testing the Tool
Writing the Documentation
Distributing Your Tool
Installing Python Locally
Introduction to Pip - Text Instructions
Basic Python Script - Text Instructions
Command Line Arguments - Text Instructions
Argument Parsing - Text Instructions
Python Tools Review 1
Validating Input - Text Instructions
Sending Requests to the Web - Text Instructions
Parsing Results - Text Instructions
Checking Forms - Text Instructions
Python Tools Review 2
Generating the Report - Text Instructions
Checking Comments - Text Instructions
Checking Inputs - Text Instructions
Improving the Report - Text Instructions
Configuration from File - Text Instructions
Using Config Settings - Text Instructions
Merging the Configs - Text Instructions
Outputting the Report - Text Instructions
Python Tools Review 3
Pushing to GitHub - Text Instructions
Python Tools Review 4
Vulnerability Report for a Website
Section 4 Introduction
Web Application Security Introduction
OWASP Overview
Introduction to the OWASP Top 10
Rails Overview
PHP Overview
Command Injection - Overview
Command Injection - Rails Example
Command Injection - PHP Example
SQL Injection - Overview
SQL Injection - Rails Example
SQL Injection - PHP Example
SQL Injection Remediation - PHP Example
Password Complexity - Overview
Password Complexity - Rails Example
Password Complexity - PHP Example
Information Leakage - Overview
Information Leakage - Rails Example
Information Leakage - PHP Example
Sensitive Data Exposure - Overview
Sensitive Data Exposure - Rails Example
Sensitive Data Exposure - PHP Example
XML External Entities (XXE) - Overview
XML External Entities (XXE) - Rails Example
XML External Entities (XXE) - PHP Example
Broken Access Control - Overview
Broken Access Control - Rails Example
Broken Access Control - PHP Example
Security Misconfiguration - Overview
Security Misconfiguration - Rails Example
Security Misconfiguration - PHP Example
Cross-Site Scripting (XSS) - Overview
Cross-Site Scripting (XSS) - Rails Example
Cross-Site Scripting (XSS) - PHP Example
Insecure Deserialization - Overview
Insecure Deserialization - Rails Example
Insecure Deserialization - PHP Example
Using Components with Known Vulnerabilities - Overview
Using Components with Known Vulnerabilities - Rails Example
Using Components with Known Vulnerabilities - PHP Example
Insufficient Logging and Monitoring - Overview
Insufficient Logging Monitoring - Rails example
Insufficient Logging Monitoring - PHP example - Text Instructions
Web Security Analysis Tool
OWASP and Vulnerabilities Review
Installing Rails and PHP
OWASP Top 10 Vulnerabilities Example Code - Where to get it
Command Injection - Rails example - Text Instructions
Command Injection - PHP example - Text Instructions
SQL Injection - Rails example - Text Instructions
SQL Injection - PHP example - Text Instructions
Password Complexity - Rails example - Text Instructions
Password Complexity - PHP example - Text Instructions
Information Leakage - Rails example - Text Instructions
Information Leakage - PHP example - Text Instructions
Sensitive Data Exposure - Rails example - Text Instructions
Sensitive Data Exposure - PHP example - Text Instructions
Web Application Security Review 1
XML External Entities (XXE) - Rails example - Text Instructions
XML External Entities (XXE) - PHP example - Text Instructions
Broken Access Control - Rails example - Text Instructions
Broken Access Control - PHP example - Text Instructions
Security Misconfiguration - Rails example - Text Instructions
Security Misconfiguration - PHP example - Text Instructions
Web Application Security Review 2
Cross-Site Scripting (XSS) - Rails example - Text Instructions
Cross-Site Scripting (XSS) - PHP example - Text Instructions
Insecure Deserialization - Rails example - Text Instructions
Insecure Deserialization - PHP example - Text Instructions
Using Components with Known Vulnerabilities - Rails example - Text Instructions
Using Components with Known Vulnerabilities - PHP example - Text Instructions
Insufficient Logging and Monitoring - Rails Example - Text Instructions
Insufficient Logging and Monitoring - PHP Example - Text Instructions
Web Application Security Review 3
Check for Vulnerabilities in a Webapp
No prior experience with Cyber Security required
Basic understanding of how the web works will be useful
No prior experience with programming necessary - Python crash course included in the course!
Start a career in Cyber Security
Analyze systems for vulnerabilities and security flaws
Build secure web applications
Use Python to build tools for security analysis
Use Python to build general purpose tools
Detect and analyze security threats to web applications
Be well versed in the current Cyber Security landscape
1.0
1 Học viên
186 Khóa học
1252 Đánh giá
Xin chào các bạn, tôi là Nguyễn Đình Cường, một lập trình viên và giảng viên đam mê công nghệ với hơn 15 năm kinh nghiệm trong ngành công nghiệp phần mềm. Tôi tốt nghiệp từ Bưu Chính Viễn Thông và đã từng làm việc cho một số công ty công nghệ hàng đầu như FPT Software và VinGroup. Với chuyên môn chính là phát triển ứng dụng web, tôi đã làm việc với nhiều công nghệ như HTML, CSS, JavaScript, React cho front-end và Node.js, Express, MongoDB cho back-end. Không chỉ dừng lại ở việc viết mã, tôi còn yêu thích tìm hiểu sâu về thiết kế hệ thống và kiến trúc phần mềm. Tôi tin rằng quá trình học lập trình không chỉ đơn thuần là lý thuyết, mà còn là sự trải nghiệm thực tế và giải quyết vấn đề. Trong các khóa học của mình, tôi cố gắng cung cấp cho học viên những bài giảng thú vị và dễ hiểu, cùng với các bài tập thực hành giúp củng cố kiến thức. Tôi hy vọng rằng qua các khóa học của mình, bạn sẽ không chỉ học được cách viết mã, mà còn phát triển tư duy lập trình và kỹ năng giải quyết vấn đề. Hãy cùng nhau khám phá thế giới lập trình và biến ý tưởng của bạn thành hiện thực! Nếu bạn có bất kỳ câu hỏi nào, đừng ngần ngại liên hệ với tôi. Tôi rất vui được hỗ trợ bạn trong hành trình học tập của mình!
Xem chi tiết