Course Overview
Welcome this great course where you'll learn python programming and ethical hacking at the same time, the course assumes you have NO prior knowledge in any of these topics, and by the end of it you'll be at a high intermediate level being able to combine both of these skills and write python programs to hack into computer systems exactly the same way that black hat hackers do, not only that but you'll be able to use the programming skills you learn here to write any program even if it has nothing to do with hacking.
Description
This course is highly practical but it won't neglect the theory, so we'll start with covering some basics about ethical hacking and python programming, installing the needed software and then we'll dive and start programming straight away. From here onwards you'll learn everything by example, by writing useful hacking programs, so we'll never have any boring dry programming lectures.
The course is divided into a number of sections each aims to achieve a specific goal, the goal is usually to hack into a certain system, so we'll start by learning how this system work, the weaknesses of this system, and then you'll learn how to write a python program to exploit these weaknesses and hack the system, as we write the program.
I will teach you python programming from scratch covering one topic at a time, so by the end of the course you're going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools, and the list goes on, not only that but you'll also have a deep understanding of how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python.
As mentioned in this course you will learn both ethical hacking and programming at the same time, so here are some of the topics that will be covered in the course:
Programming topics:
Writing programs for python 2 and 3.
Using modules and libraries.
Variables, types ...etc.
Handling user input.
Reading and writing files.
Functions.
Loops.
Data structures.
Regex.
Desiccation making.
Recursion.
Threading.
Object-oriented programming.
Packet manipulation using scapy.
Netfilterqueue.
Socket programming.
String manipulation.
Exceptions.
Serialization.
Compiling programs to binary executables.
Sending & receiving HTTP requests.
Parsing HTML.
+ more!
Hacking topics:
Basics of network hacking/penetration testing.
Changing MAC address & bypassing filtering.
Network mapping.
ARP Spoofing - redirect the flow of packets in a network.
DNS Spoofing - Redirect requests from one website to another.
Spying on any client connected to the network - see usernames, passwords, visited URLs ....etc.
Inject code in pages loaded by any computer connected to the same network.
Replace files on the fly as they get downloaded by any computer on the same network.
Detect ARP spoofing attacks.
Bypass HTTPS.
Create malware for Windows, OS X, and Linux.
Create trojans for Windows, OS X, and Linux.
Hack Windows, OS X, and Linux using the custom backdoor.
Bypass Anti-Virus programs.
Use fake login prompt to steal credentials.
Display fake updates.
Use own keylogger to spy on everything typed on a Windows or OS X computer.
Learn the basics of website hacking/penetration testing.
Discover subdomains.
Discover hidden files and directories in a website.
Run wordlist attacks to guess login information.
Discover and exploit XSS vulnerabilities.
Discover weaknesses in websites using own vulnerability scanner
Course Preview
Course Duration
- 176 Lectures and 24 Hours
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
- 5000+ students enrolled
- Complete Practical Training
- Download access
- Watch Videos in Android and iOS App
Instructor
Zaid Al-Quraishi, is an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.
I have tremendous experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty), I also worked as a pentester for the same company. In 2013 I started teaching my first course live and online, this course received amazing feedback which motivated me to publish more courses.
FAQs
Students Testimonials
Payment & Security
Payment methods
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
Security
