- Duration: Flexible
Course details
( )
use of Python in networks and cybersecurity
============================================
:
1- 10
:
1-
2-
:
40
===========================================
:
ip
ports
protoclos
1-
2-
3-
4- ip ip
5-
6-
: 4 :
1- DDOS ATTACKER
2- NMAP
3- IPLOGGER
4- WIRESHARK
:
=============
:
1-
2-
:
-------------------------
1 - ip
2- ip
3-
4-
5- hub
6- nat
7-
8-
9- html
10 -
11-
12-
13-
14-
15-
16-
17-
18-
19-
20-
21-
22- tcp - udp
23-
24-
25- 65
26- nmap
27-
28-
29-
30-
31-
32-
Descipton English:
use of Python in networks and cybersecurity
===============
In this course, you will learn all about networks in boring detail
The system we will use:
1- Windows 10
Required programs:
1- A code editor
2- Python Editor
Lessons:
40 lessons
==========================================
How to extract IP and what is the computer language that is interpreted, identify IP types and their versions, and create scripts
Python does all these operations in boring detail
And how do transfers between networks take place and also what are the ports
And how is it used and defined, and from which ports the data is sent, and what are the open and closed ports?
It is called hacker ports and checks your system portals and checks the portals of any site whether they are open or not
Scripts that do all these operations in Python and from scratch
I will teach you how to fall sites theoretically and practically by hacker attacks to destroy sites in detail and creation
Tools and script of your own attacking websites in addition to controlling the size of the data sent
We will also learn about the protocols responsible for transferring data between networks, how it is transferred, and what size it is
And create scripts in Python that will monitor the entire network for you:
1- A script that monitors data transmission between the two networks
2- A script that monitors the size of the transmitted data
3- A script that tells you the type of protocol that receives the transfer task
4- A script that tells you which ip sends data and which ip receives the data
5- A script tells you which port data was sent, and the port tells you which data was quit
6- Scripting the attack on the sites to destroy them
Waza: You will program 4 tools available on Kali Linux:
1- DDOS ATTACKER
2- NMAP
3- IPLOGGER
4- WIRESHARK
Manually and professionally, and with the grace of God, networks will be proficient and design tools in your name and rights, as do the big hackers
Course index:
=============
Tools and software:
1- Install the Visual Studio Code Editor
2- Install the Python editor
Course index:
-------------------------
1 - Information security expert About the IP
2- An information and network security expert, extracting the IP via the terminal and via Python script
3- An information and networks security expert, explaining the computer and IP language
4- An expert in information security, IP networks and computer language, in boring detail
5- An expert in information and network security, a hub device
6- An expert in information security, internal and external IP networks, and the nat feature
7- An expert in information and network security, extracting internal and external IPs with ease
8- An information and network security expert, merging an image with a link, and obtaining the system type, the name of the connection, the browser, Eaby,, and
9- An information and network security expert, injecting a link on the html page and pulling all the persons information with ease
10 - An expert in information and network security. Determining the persons location on the map by checking through the IP
11- Information and network security expert to identify ports
12- An expert in information security, networks, and very important ports and protocols
13- Information and networks security expert. Create a protocol for port name recognition tool
14- Information and networks security expert, create a port extraction tool according to the protocol name
15- An expert in information and network security, how to open the hacker port in the hacker's device and control it completely
16- An information and network security expert, knowing whether you are a hacker or not, and monitoring movements
17- An information and network security expert, searching for the identifier of the operation and killing it if it was suspect
18- An information and network security expert, spyware detection and deletion
19- An information and network security expert, scanning suspicious programs in the startup and patch files
20 - Information and network security expert, working in companies and what and what and port security
21- An expert in information security, networks, protocols, in detail, promos
22- An information and network security expert, explaining the TCP - UDP protocol and the packets
23- An information and network security expert making a site portlet check tool with ease
24- An information and network security expert. Creating a tool to check your computer portals whether it is open or not
25- An information and network security expert made an automatic scanning tool for 65,000 ports in the device
26- An expert in information and network security, making the nmap tool on Windows professionally
27- Information security expert designing a tool that monitors traffic in the network
28- An expert in information security, identifying the protocol that performs the movement within our network
29- An information security expert extracts the sender and receiver IPI of the data with the protocol
30- An information security expert, monitoring the network in full detail and issuing the program
31- An expert in information and network security, destroying and dropping sites in theoretical detail
32- An information and network security expert creating a script to destroy websites and how to protect against these attacks
- Cyber Security For Non-Tech People Alpha AcademyAED 56
AED 551Duration: Upto 2 Hours - Cyber Security Law Academy for Health & FitnessAED 46Duration: Upto 4 Hours