Select Your Style

Choose your layout

Color scheme

Using Python for Ethical Hacking

Using Python for Ethical Hacking

INR₹2,118.00 + GST

Please login before applying the coupon.

SKU: cid_131717 Category: Tags: , ,
About the course

This course is ethical hacking using python is designed for you to learn the fundamentals of ethical hacking using Python. You will understand how python programming language is used for ethical hacking. In this course, you will learn about brute force attack and how it works. After that, you will learn about how UNIX password cracking works and how to add optparse. Then you will learn about the archive and zip password cracker. You will also learn about the port scanner, NMAP, NMAP port scanner followed by a botnet and its types, and how to build a basic botnet. After that, you will learn about SSH brute-force and web scraping. The course will conclude with the way to find metadata in images followed by editing and removing metadata. This is completely an online course with a short duration. You can access this course from anywhere in the world.

Credit Score  = 3+1+4+(6+1+45) = 60 (Formula to calculate credit score is available here)
Learning Outcomes

After completing this course, you will be able to:

  • Understand the basics of ethical hacking.
  • Understand the use of Python in ethical hacking.
  • Get hands-on experience with Python programming language.
  • Boost your hireability through innovative and independent learning.
  • Get a certificate on successful completion of the course.
Target Audience

The course can be taken by:

Students: All students who are pursuing any technical/professional courses related to computer science / Information Technology.

Teachers/Faculties: All teachers/faculties who wish to acquire new skills.

Professionals:Professionals: All network professionals, who wish to upgrade their skills.

Why learn Ethical Hacking?

Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. According to surveys conducted by the cybersecurity firms in the country, Indian firms lost more than $4 billion in 2013 alone because of hackers. With more and more companies entering the e-commerce ecosystem and adopting new technologies like cloud computing, the threat from imminent security breaches is clearly demanding the need for efficient information security systems. The rising threat from cyber-attacks has exposed the severe shortage of talent in this sector. As per 2015 figures reported by Nasscom, India needed more than 77,000 white hat hackers as against only a mere 15,000 certified professional ethical hackers in that year.

Course Features
  • 24X7 Access: You can view lectures as per your own convenience.
  • Online lectures: 3 hours of online lectures with high-quality videos.
  • Updated Quality content: Content is latest and gets updated regularly to meet the current industry demands.
Test & Evaluation

There will be a final test containing a set of multiple choice questions. Your evaluation will include the scores achieved in the final test.

  1. The access to the course can be extended 3 months at a time (for upto 4 times) just by sending a mail requesting for an extension to the email id in the footer.
  2. The hard copy of the certificate shall be shipped to your registered address or your college
  3. There is no soft copy of the certificate.
  4. To get access to the certificate - you need to take the online exam at the end of the course

Basic mathematical calculation skills and logical skills

Topics to be covered
  1. What is a brute-force attack?

    इस लैक्चर में हम brute-force attack के बारे में समझेंगे और ये देखेंगे कि यह किस तरह से काम करता है।

  2. Unix Password Cracker

    इस लैक्चर में हम सीखेंगे कि Unix password cracking किस तरह से काम करती है और optparse को कैसे add किया जाता है इसके बारे में भी जानेंगे।

  3. Using Source Code
  4. Zip Password Cracker

    इस लैक्चर में हम ये सीखेंगे कि archive क्या होती है और zip password cracker किस तरह से काम करता है।

  5. What is a port scanner?

    इस लैक्चर में हम ये सीखेंगे कि port scanner किस तरह काम करते है और इसकी हमें क्या जरूरत होती है तथा ये भी जानेंगे कि NMAP क्या होता है।

  6. How can we make a basic port scanner?

    इस लैक्चर में हम ये जानेंगे कि port scanner किस तरह काम करता है और इसी के साथ हम ये जानेंगे कि semaphore's क्या होता है।

  7. How can we make a Nmap port scanner?

    इस लैक्चर में हम ये जानेंगे कि NMAP port scanner किस तरह काम करता है और ये देखेंगे कि हम Code को किस तरह से set up करते हैं।

  8. What is a botnet?

    इस लैक्चर में हम botnet व इसके विभिन्न types के बारे में जानेंगे और ये भी सीखेंगे कि यह किस तरह काम करता है।

  9. How can we build a basic SSH botnet

    इस लैक्चर में हम SSH के बारे में जानेंगे और हम SSH botnet program क्रिएट करना सीखेंगे।

  10. What is SSH brute-force?

    इस लैक्चर में हम SSH के बारे में जानेंगे व ये भी देखेंगे कि यह किस तरह काम करता है।

  11. What is web scraping?

    इस लैक्चर में हम WEB SCRAPING के बारे में जानेंगे और ये देखेंगे कि WEB SCRAPING किस तरह की जाती है इसके साथ ही हम ये भी जानेंगे कि SCRAPY व SELENIUM क्या होती है।

  12. Finding Metadata in Images

    इस लैक्चर में हम METADATA के बारे में जानेंगे और ये जानेंगे कि यह किस तरह काम करता है।

  13. Editing or Removing MetaData

    इस लैक्चर में हम METADATA को edit करना सीखेंगे और ये जानेंगे कि किस तरह METADATA edit किया जाता है।

As a part of this program, you are required to do project work. The project specifications have been drawn in consultation with the industry. The project work has to meet these specifications and can be done in group of upto 5 members.

Create a powerpoint presentation of at least 30 slides on (any three of the following): (3 PPTs of 30 slides each, max time 30 mins per slide)

  • Brute-force attack and how it can be prevented
  • Working of Unix Password Cracker and Zip Password Cracker
  • What is Botnet and how to build SSH botnet program
  • Types of Botnets and how to prevent Botnet attacks
  • What is web scraping, how it is done and what is Selenium?
  • SSH Brute-force attack and how it works
  • Port scanner, how a basic and Nmap port scanner is made

Please make sure that these slides or programs are not copied from any source and it should be based on your own research / learning from the course.