python networking | البايثون والتجسس على الشبكات Udemy
Price: USD 200
  • Duration: Flexible

Course details

( )

use of Python in networks and cybersecurity

============================================

:

1-  10

:

1-

2-

:

40

===========================================

:

ip

ports

protoclos

1-

2-

3-

4- ip ip

5-

6-

: 4 :

1- DDOS ATTACKER

2- NMAP

3- IPLOGGER

4- WIRESHARK

:

=============

:

1- 

2-

  :

-------------------------

1 -   ip

2- ip

3-

4-

5- hub

6- nat

7-

8-

9- html

10 - 

11-

12-

13-

14-

15-

16-

17-

18-

19-

20-

21-

22- tcp - udp

23-

24-

25- 65

26- nmap

27-

28-

29-

30-

31-

32-


Descipton English:

use of Python in networks and cybersecurity

===============

In this course, you will learn all about networks in boring detail

The system we will use:

1- Windows 10

Required programs:

1- A code editor

2- Python Editor

Lessons:

40 lessons

==========================================

How to extract IP and what is the computer language that is interpreted, identify IP types and their versions, and create scripts

Python does all these operations in boring detail

And how do transfers between networks take place and also what are the ports

And how is it used and defined, and from which ports the data is sent, and what are the open and closed ports?

It is called hacker ports and checks your system portals and checks the portals of any site whether they are open or not

Scripts that do all these operations in Python and from scratch

I will teach you how to fall sites theoretically and practically by hacker attacks to destroy sites in detail and creation

Tools and script of your own attacking websites in addition to controlling the size of the data sent

We will also learn about the protocols responsible for transferring data between networks, how it is transferred, and what size it is

And create scripts in Python that will monitor the entire network for you:

1- A script that monitors data transmission between the two networks

2- A script that monitors the size of the transmitted data

3- A script that tells you the type of protocol that receives the transfer task

4- A script that tells you which ip sends data and which ip receives the data

5- A script tells you which port data was sent, and the port tells you which data was quit

6- Scripting the attack on the sites to destroy them

Waza: You will program 4 tools available on Kali Linux:

1- DDOS ATTACKER

2- NMAP

3- IPLOGGER

4- WIRESHARK

Manually and professionally, and with the grace of God, networks will be proficient and design tools in your name and rights, as do the big hackers

Course index:

=============

Tools and software:

1- Install the Visual Studio Code Editor

2- Install the Python editor

Course index:

-------------------------

1 - Information security expert About the IP

2- An information and network security expert, extracting the IP via the terminal and via Python script

3- An information and networks security expert, explaining the computer and IP language

4- An expert in information security, IP networks and computer language, in boring detail

5- An expert in information and network security, a hub device

6- An expert in information security, internal and external IP networks, and the nat feature

7- An expert in information and network security, extracting internal and external IPs with ease

8- An information and network security expert, merging an image with a link, and obtaining the system type, the name of the connection, the browser, Eaby,, and

9- An information and network security expert, injecting a link on the html page and pulling all the persons information with ease

10 - An expert in information and network security. Determining the persons location on the map by checking through the IP

11- Information and network security expert to identify ports

12- An expert in information security, networks, and very important ports and protocols

13- Information and networks security expert. Create a protocol for port name recognition tool

14- Information and networks security expert, create a port extraction tool according to the protocol name

15- An expert in information and network security, how to open the hacker port in the hacker's device and control it completely

16- An information and network security expert, knowing whether you are a hacker or not, and monitoring movements

17- An information and network security expert, searching for the identifier of the operation and killing it if it was suspect

18- An information and network security expert, spyware detection and deletion

19- An information and network security expert, scanning suspicious programs in the startup and patch files

20 - Information and network security expert, working in companies and what and what and port security

21- An expert in information security, networks, protocols, in detail, promos

22- An information and network security expert, explaining the TCP - UDP protocol and the packets

23- An information and network security expert making a site portlet check tool with ease

24- An information and network security expert. Creating a tool to check your computer portals whether it is open or not

25- An information and network security expert made an automatic scanning tool for 65,000 ports in the device

26- An expert in information and network security, making the nmap tool on Windows professionally

27- Information security expert designing a tool that monitors traffic in the network

28- An expert in information security, identifying the protocol that performs the movement within our network

29- An information security expert extracts the sender and receiver IPI of the data with the protocol

30- An information security expert, monitoring the network in full detail and issuing the program

31- An expert in information and network security, destroying and dropping sites in theoretical detail

32- An information and network security expert creating a script to destroy websites and how to protect against these attacks


Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or