Course Overview

If you're eager to delve into the world of ethical hacking, our top-rated Python course is the perfect starting point. This comprehensive program is designed to teach you the fundamentals of ethical hacking and penetration testing through hands-on Python coding projects. Whether you're a beginner or looking to expand your cybersecurity skills, this course covers a wide range of topics to give you a robust understanding of how to secure and test computer systems effectively.

The course begins with an introduction to ethical hacking and the necessary setup for your Python environment. You'll then dive into port and vulnerability scanning to identify potential weaknesses in systems. As you progress, you'll explore various attack vectors, including SSH and FTP attacks, and learn techniques for password cracking. Additionally, you'll develop tools for network traffic analysis, such as sniffers, flooders, and spoofers, and master DNS spoofing to manipulate domain name systems. Further into the course, you'll enhance your skills by coding a multifunctional reverse shell and creating keyloggers to monitor keystrokes. We'll guide you through building a command and control center to manage your penetration testing operations. The course culminates with an in-depth module on website penetration testing, equipping you with the knowledge to assess and secure web applications. 

With this course, you'll gain the practical experience and confidence needed to excel in the field of ethical hacking.

What You Will Learn

  • Learn Ethical Hacking
  • Master Python Programming
  • Learn Port and Vulnerability Scanning
  • Understand Multi-functioning Reverse Shell
  • Learn DNS Spoofing

Program Curriculum

  • VirtualBox Installation
  • Kali Linux Installation
  • Adjusting Guest Additions
  • Python in Kali Terminal
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Coding a Simple Port Scanner
  • Adding raw_input to Our Port Scanner
  • Scanning the First 1,000 Ports
  • Coding an Advanced Port Scanner Part 1
  • Coding an Advanced Port Scanner Part 2
  • Finishing and Testing Our Scanner
  • Configuring IP Address and Installing Metasploitable
  • Returning Banner from Open Port
  • Coding a Vulnerability Scanner Part 1
  • Coding a Vulnerability Scanner Part 2
  • Chapter 2 Quiz

  • Automating SSH Login Part 1
  • Automating SSH Login Part 2
  • Testing Our SSH Login Program
  • Coding a SSH Brute-forcer
  • Executing Commands on Target After Brute-forcing SSH
  • Anonymous FTP Login Attack
  • Username and Password List Attack on FTP
  • Chapter 3 Quiz

  • SHA256, SHA512, MD5
  • Cracking SHA1 Hash with Online Dictionary
  • Getting Password from MD5 Hash
  • Cracking Crypt Passwords with Salt
  • Chapter 4 Quiz

  • Changing MAC Address Manually
  • Coding MAC Address Changer
  • Theory Behind ARP Spoofing
  • Crafting Malicious ARP Packet
  • Coding ARP Spoofer
  • Forwarding Packets and Restoring ARP Tables
  • Spoofing Our IP Address and Sending Message with TCP Payload
  • Running SynFlooder with Changed Source IP Address
  • Getting Source and Destination MAC Address from Received Packets
  • Sniffing FTP Username and Password Part 1
  • Sniffing FTP Username and Password Part 2
  • Getting Passwords from HTTP Websites
  • Chapter 5 Quiz

  • Cloning Any Webpage
  • Printing DNS Queries
  • Redirecting Response to Cloned Page
  • Setting IP Table Rules and Running DNS Spoofer
  • Chapter 6 Quiz

  • Analyzing Ethernet Header
  • Analyzing IP Header Part 1
  • Analyzing IP Header Part 2
  • Analyzing TCP Header
  • Analyzing UDP Header
  • Chapter 7 Quiz

  • Theory Behind Socket Programming
  • Wine and Pyinstaller Installation
  • Setting up Listener
  • Establishing Connection Between Target and Server
  • Implementing Send and Receive Functions
  • Executing Commands on Target System
  • Importing JSON Library to Parse Data
  • Converting Python Backdoor to .exe
  • Using OS Library to Change Directory
  • Downloading and Uploading Files to Target PC
  • Hiding Our Backdoor and Creating Persistence
  • Trying to Connect to Server Every 20 Seconds
  • Downloading Files to Target PC
  • Capturing Screenshot on Target PC
  • Administrator Privilege Check
  • Starting Other Programs with Our Shell
  • Running Our Shell as an Image, Audio, PDF
  • Chapter 8 Quiz

  • Installing Pynput
  • Printing Space Character
  • Calling Timer on Our Keylogger
  • Adding Keylogger to Our Backdoor
  • Chapter 9 Quiz

  • What is a Threaded Server?
  • Accepting Connections with a Thread
  • Managing Multiple Sessions
  • Testing Threaded Server with Windows 10 Target
  • Fixing Q Command
  • Coding Exit Function
  • Attacking Multiple Targets and Gathering Botnet
  • Chapter 10 Quiz

  • Stealing Saved Wireless Passwords
  • Saving Passwords to a File
  • Bruteforcing Gmail
  • Bruteforcing Any Login Page Part 1
  • Bruteforcing Any Login Page Part 2
  • Finding Hidden Directories Part 1
  • Finding Hidden Directories Part 2
  • Discovering Subdomains
  • Changing HTTP Headers
  • Starting Basic and Digest Authentication Bruteforcer
  • Controlling Threads
  • Coding Run Function
  • Printing Usage and Testing Our Program
  • Taking a Look at Ransomware
  • Chapter 11 Quiz
Load more modules

Instructor

Joseph Delgadillo

Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 600,000 students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more. He graduated with honours from Central Washington University.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8