Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security - Python and Web Applications
Training Overview
Description of Training
Video Overview (2:22)
Introduction
Introduction (3:03)
Course Work Overview (1:53)
Sample Tool 1 - Log Analyzer (10:22)
Sample Tool 1 - Text Instructions
Sample Tool 2 - Password Checker (7:26)
Sample Tool 2 - Text Instructions
Development Environment Overview (4:33)
Important course updates (don't skip)
Cyber Security
Cyber Security Introduction to Section 2 (0:45)
What is Cyber Security (8:01)
Quiz 1: Cyber Security Introduction Quiz
Explaining the methodology (7:12)
Quiz 2: Methodology Quiz
Intro to Python and Python crash course (section 7) for beginners
repl.it Introduction (6:33)
Quiz 3: Basics Review
Penetration Testing - Overview (5:31)
Quiz 4: Penetration Testing Quiz
Penetration Testing - Code Example (5:27)
Penetration Testing - Text Instructions
Penetration Testing - Remediation (8:28)
Port Scanning - Overview (4:29)
Quiz 5: Port Scanning Quiz
Port Scanning - Code Example (3:38)
Port Scanning - Text Instructions
Port Scanning - Remediation (3:51)
Botnets - Overview (6:01)
Botnets - Code Example (5:06)
Botnets - Code Example Continued (5:04)
Botnets - Text Instructions
Botnets - Remediation (12:15)
Quiz 6: Cyber Security Topics Review 1
Code Exploits - Overview (4:51)
Code Exploits - Code Example (5:33)
Code Exploits - Text Instructions
Code Exploits - Remediation (3:55)
Forensic Investigation - Overview (5:31)
Forensic Investigation - Code Example (8:29)
Forensic Investigation - Text Instructions
Forensic Investigation - Remediation (5:09)
Network Traffic Analysis - Overview (5:11)
Network Traffic Analysis - Code Example (4:28)
Network Traffic Analysis - Text Instructions
Network Traffic Analysis - Remediation (3:43)
Quiz 7: Cyber Security Topics Review 2
Wireless - Overview (4:33)
Wireless - Code Example (3:08)
Wireless - Text Instructions
Wireless - Remediation (9:58)
Web Reconnaissance - Overview (5:31)
Web Reconnaissance - Code Example (9:36)
Web Reconnaissance - Text Instructions
Web Reconnaissance - Remediation (6:30)
Antivirus Evasion - Overview (5:39)
Antivirus Evasion - Code Example (7:02)
Antivirus Evasion - Text Instructions
Antivirus Evasion - Remediation (3:33)
Social Engineering - Overview (6:57)
Social Engineering - Code Example (4:30)
Social Engineering - Text Instructions
Social Engineering - Remediation (2:56)
Quiz 8: Cyber Security Topics Review 3
Building a Security Tool
Introduction to Section 3 - Building your own tool with Python (1:15)
Installing Python Locally
Tool Development with Python - Overview (4:54)
Introduction to Pip (3:55)
Introduction to Pip - Text instructions
Basic Python Script (3:24)
Basic Python Script - Text Instructions
Command Line Arguments (3:16)
Command Line Arguments - Text Instructions
Argument Parsing (6:29)
Argument Parsing - Text Instructions
Quiz 9: Python Tools Review 1
Validating Input (3:37)
Validating Input - Text Instructions
Sending Requests to the Web (2:40)
Sending Requests to the Web - Text Instructions
Parsing Results (6:43)
Parsing Results - Text Instructions
Checking Forms (4:31)
Checking Forms - Text Instructions
Quiz 10: Python Tools Review 2
Generating the Report (2:19)
Generating the Report - Text Instructions
Checking Comments (6:32)
Checking Comments - Text Instructions
Checking Inputs (5:12)
Checking Inputs - Text Instructions
Improving the Report (2:57)
Improving the Report - Text Instructions
Configuration from File (3:42)
Configuration from File - Text Instructions
Using Config Settings (7:16)
Using Config Settings - Text Instructions
Merging the Configs (2:09)
Merging the Configs - Text Instructions
Outputting the Report (8:36)
Outputting the Report - Text Instructions
Quiz 11: Python Tools Review 3
Pushing to GitHub (4:29)
Pushing to GitHub - Text Instructions
Testing the Tool (6:05)
Writing the Documentation (6:24)
Distributing Your Tool (5:48)
Quiz 12: Python Tools Review 4
Web Application Security
Section 4 Introduction (1:17)
Web Application Security Introduction (6:00)
OWASP Overview (4:37)
Introduction to the OWASP Top 10 (1:27)
Quiz 13: OWASP and Vulnerabilities Review
Rails Overview (3:14)
PHP Overview (5:08)
Installing Rails and PHP
OWASP Top 10 Vulnerabilities Example Code - Where to get it
Command Injection - Overview (4:48)
Command Injection - Rails Example (6:44)
Command Injection - Rails example - Text Instructions
Command Injection - PHP Example (4:10)
Command Injection - PHP example - Text Instructions
SQL Injection - Overview (6:25)
SQL Injection - Rails Example (3:59)
SQL Injection - Rails example - Text Instructions
SQL Injection - PHP Example (3:31)
SQL Injection Remediation - PHP Example (2:26)
SQL Injection - PHP example - Text Instructions
Password Complexity - Overview (6:46)
Password Complexity - Rails Example (6:50)
Password Complexity - Rails example - Text Instructions
Password Complexity - PHP Example (6:28)
Password Complexity - PHP example - Text Instructions
Information Leakage - Overview (4:56)
Information Leakage - Rails Example (3:07)
Information Leakage - Rails example - Text Instructions
Information Leakage - PHP Example (7:13)
Information Leakage - PHP example - Text Instructions
Sensitive Data Exposure - Overview (4:53)
Sensitive Data Exposure - Rails Example (4:23)
Sensitive Data Exposure - Rails example - Text Instructions
Sensitive Data Exposure - PHP Example (2:54)
Sensitive Data Exposure - PHP example - Text Instructions
Quiz 14: Web Application Security Review 1
XML External Entities (XXE) - Overview (4:40)
XML External Entities (XXE) - Rails Example (4:36)
XML External Entities (XXE) - Rails example - Text Instructions
XML External Entities (XXE) - PHP Example (4:28)
XML External Entities (XXE) - PHP example - Text Instructions
Broken Access Control - Overview (5:12)
Broken Access Control - Rails Example (11:56)
Broken Access Control - Rails example - Text Instructions
Broken Access Control - PHP Example (3:39)
Broken Access Control - PHP example - Text Instructions
Security Misconfiguration - Overview (5:50)
Security Misconfiguration - Rails Example (3:46)
Security Misconfiguration - Rails example - Text Instructions
Security Misconfiguration - PHP Example (3:28)
Security Misconfiguration - PHP example - Text Instructions
Quiz 15: Web Application Security Review 2
Cross-Site Scripting (XSS) - Overview (1:34)
Cross-Site Scripting (XSS) - Rails Example (5:09)
Cross-Site Scripting (XSS) - Rails example - Text Instructions
Cross-Site Scripting (XSS) - PHP Example (5:50)
Cross-Site Scripting (XSS) - PHP example - Text Instructions
Insecure Deserialization - Overview (3:46)
Insecure Deserialization - Rails Example (5:18)
Insecure Deserialization - Rails example - Text Instructions
Insecure Deserialization - PHP Example (7:22)
Insecure Deserialization - PHP example - Text Instructions
Using Components with Known Vulnerabilities - Overview (5:28)
Using Components with Known Vulnerabilities - Rails Example (11:01)
Using Components with Known Vulnerabilities - Rails example - Text Instructions
Using Components with Known Vulnerabilities - PHP Example (4:38)
Using Components with Known Vulnerabilities - PHP example - Text Instructions
Insufficient Logging and Monitoring - Overview (4:06)
Insufficient Logging Monitoring - Rails example (5:49)
Insufficient Logging and Monitoring - Rails Example - Text Instructions
Insufficient Logging Monitoring - PHP example (6:14)
Insufficient Logging and Monitoring - PHP Example - Text Instructions
Quiz 16: Web Application Security Review 3
Web Security Analysis Tool (9:17)
Topics in Cyber Security
Multi-Factor Authentication (16:35)
Ethical Hacking (5:08)
Password Complexity (11:18)
Physical Security (10:31)
Data Breaches (9:34)
Cloud Security (11:44)
Python Password Encryption Tool
Password Encryption Tool Introduction (0:56)
Password Encryption Overview (2:35)
Creating the Tool (2:48)
Command Line Arguments (4:15)
Adding Encryption (4:45)
Check If Encryption Works (2:32)
Password Encryption Tool - Source Code
Python Crash Course
Installation and expectations
Strings
Numbers
Lists, Tuples, Sets
Dictionaries
Branching and Functions/Methods
Standard library and imports
Object Oriented Programming: Classes
Summary
Thank You! (1:07)
Appendix A: Acknowledgements
Appendix B: Glossary
Penetration Testing - Code Example
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW