[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
GET VPN
Downloading torrents is getting riskier every day. Use a VPN to make yourself hidden while downloading torrents. By using a VPN , your ISP and Government Agencies will not be able to spy on you, neither would they be able to track your online activity!
Course link: https://www.coursera.org/programs/career-training-for-nevadans-k7yhc/specializations/advanced-python-scripting-for-cybersecurity Specialization - 3 course series Python is one of the most popular and widely-used programming languages in the world, due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using advanced Python features for offensive and defense cybersecurity. This path demonstrates how some of the advanced functionality in Python packages can be applied to cybersecurity and how to automate multi-stage attack chains and defensive operations using Python. This Advanced Python Scripting for Cybersecurity Skills Path builds on the Python for Cybersecurity skills path to demonstrate advanced applications of Python for cybersecurity. Applied Learning Project This course does not contain any projects. This course does not contain any projects. This course does not contain any projects. This course does not contain any projects. This course does not contain any projects. This course does not contain any projects. Advanced Python - Reconnaissance Course 1 • 3 hours Establishing Command-and-Control and Finding Credentials Course 2 • 3 hours Defensive Python Course 3 • 2 hours
9
Other /Tutorials
903.8 MB
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
defensive-python
01_defensive-python onehack.us
01_defensive-python
01_04_detecting-ssh-brute-force-with-scapy.mp4 (47.4 MB)
01_01_introduction-to-defensive-python.en.srt (16.0 KB)
01_01_introduction-to-defensive-python.en.txt (10.2 KB)
01_01_introduction-to-defensive-python.mp4 (19.4 MB)
01_02_brute-force-detection-with-windows-events.en.srt (24.7 KB)
01_02_brute-force-detection-with-windows-events.en.txt (12.9 KB)
01_02_brute-force-detection-with-windows-events.mp4 (37.0 MB)
01_03_detecting-ftp-brute-force-with-scapy.en.srt (20.1 KB)
01_03_detecting-ftp-brute-force-with-scapy.en.txt (10.6 KB)
01_03_detecting-ftp-brute-force-with-scapy.mp4 (33.5 MB)
01_04_detecting-ssh-brute-force-with-scapy.en.srt (25.4 KB)
01_04_detecting-ssh-brute-force-with-scapy.en.txt (13.4 KB)
01_05_feature-selection-for-traffic-analysis.en.srt (23.2 KB)
01_05_feature-selection-for-traffic-analysis.en.txt (12.0 KB)
01_05_feature-selection-for-traffic-analysis.mp4 (43.1 MB)
01_06_detecting-anomalous-network-traffic-with-scapy.en.srt (14.6 KB)
01_06_detecting-anomalous-network-traffic-with-scapy.en.txt (7.6 KB)
01_06_detecting-anomalous-network-traffic-with-scapy.mp4 (27.5 MB)
01_07_connection-hijacking-with-scapy.en.srt (28.2 KB)
01_07_connection-hijacking-with-scapy.en.txt (17.8 KB)
01_07_connection-hijacking-with-scapy.mp4 (46.1 MB)
01_08_defensive-python_exam.html (5.1 KB)
0. Join Our Discord for More Awesome Stuff!.txt (0.2 KB)
establishing-command-and-control-and-finding-credentials
01_establishing-command-and-control
01_establishing-command-and-control
01_01_introduction-to-command-and-control.en.srt (16.9 KB)
01_01_introduction-to-command-and-control.en.txt (10.7 KB)
01_01_introduction-to-command-and-control.mp4 (20.3 MB)
01_02_traffic-analysis-with-python.en.srt (26.9 KB)
01_02_traffic-analysis-with-python.en.txt (14.0 KB)
01_02_traffic-analysis-with-python.mp4 (41.7 MB)
01_03_calculating-entropy-with-python.en.srt (14.0 KB)
01_03_calculating-entropy-with-python.en.txt (7.3 KB)
01_03_calculating-entropy-with-python.mp4 (18.8 MB)
01_04_detecting-encodings-with-python.en.srt (14.4 KB)
01_04_detecting-encodings-with-python.en.txt (9.1 KB)
01_04_detecting-encodings-with-python.mp4 (23.0 MB)
01_05_building-c2-packets-with-python.en.srt (19.0 KB)
01_05_building-c2-packets-with-python.en.txt (9.8 KB)
01_05_building-c2-packets-with-python.mp4 (25.9 MB)
02_finding-credentials
01_finding-credentials
01_01_introduction-to-credential-access.en.srt (16.2 KB)
01_01_introduction-to-credential-access.en.txt (10.2 KB)
01_01_introduction-to-credential-access.mp4 (19.3 MB)
01_02_dumping-chrome-credentials-with-python.en.srt (17.2 KB)
01_02_dumping-chrome-credentials-with-python.en.txt (8.9 KB)
01_02_dumping-chrome-credentials-with-python.mp4 (33.1 MB)
01_03_searching-the-registry-with-python.en.srt (23.0 KB)
01_03_searching-the-registry-with-python.en.txt (14.3 KB)
01_03_searching-the-registry-with-python.mp4 (43.1 MB)
01_04_searching-the-system-with-python.en.srt (23.7 KB)
01_04_searching-the-system-with-python.en.txt (12.4 KB)
01_04_searching-the-system-with-python.mp4 (33.3 MB)
01_05_cracking-the-linux-passwords-with-python.en.srt (15.4 KB)
01_05_cracking-the-linux-passwords-with-python.en.txt (9.9 KB)
01_05_cracking-the-linux-passwords-with-python.mp4 (23.3 MB)
01_06_analyzing-passwords-with-python.en.srt (22.4 KB)
01_06_analyzing-passwords-with-python.en.txt (11.7 KB)
01_06_analyzing-passwords-with-python.mp4 (32.9 MB)
01_07_establishing-command-and-control-and-finding-credentials_exam.html (10.5 KB)
python-in-recon
01_introduction onehack.us
01_introduction-to-advanced-python-for-cybersecurity
01_01_welcome-to-advanced-python-for-cybersecurity.en.srt (1.9 KB)
01_01_welcome-to-advanced-python-for-cybersecurity.en.txt (1.0 KB)
01_01_welcome-to-advanced-python-for-cybersecurity.mp4 (8.2 MB)
01_02_introduction-to-python.en.srt (11.1 KB)
01_02_introduction-to-python.en.txt (5.8 KB)
01_02_introduction-to-python.mp4 (10.6 MB)
01_03_introduction-to-mitre-att-ck-and-shield.en.srt (16.5 KB)
01_03_introduction-to-mitre-att-ck-and-shield.en.txt (8.6 KB)
01_03_introduction-to-mitre-att-ck-and-shield.mp4 (20.6 MB)
02_performing-reconnaissance
01_performing-reconnaissance
01_01_introduction-to-reconnaissance.en.srt (18.0 KB)
01_01_introduction-to-reconnaissance.en.txt (11.4 KB)
01_01_introduction-to-reconnaissance.mp4 (22.0 MB)
01_02_querying-shodan-with-python.en.srt (20.3 KB)
01_02_querying-shodan-with-python.en.txt (10.6 KB)
01_02_querying-shodan-with-python.mp4 (41.9 MB)
01_03_dns-queries-with-python.en.srt (18.6 KB)
01_03_dns-queries-with-python.en.txt (11.7 KB)
01_03_dns-queries-with-python.mp4 (29.4 MB)
01_04_network-scanning-with-scapy.en.srt (25.1 KB)
01_04_network-scanning-with-scapy.en.txt (13.0 KB)
01_04_network-scanning-with-scapy.mp4 (37.0 MB)
01_05_service-detection-with-python.en.srt (31.7 KB)
01_05_service-detection-with-python.en.txt (16.4 KB)
01_05_service-detection-with-python.mp4 (43.5 MB)
01_06_cve-lookups-with-python.en.srt (7.9 KB)
01_06_cve-lookups-with-python.en.txt (5.0 KB)
01_06_cve-lookups-with-python.mp4 (12.6 MB)
03_gaining-initial-access
01_gaining-initial-access
01_01_introduction-to-initial-access.en.srt (20.5 KB)
01_01_introduction-to-initial-access.en.txt (10.8 KB)
01_01_introduction-to-initial-access.mp4 (21.3 MB)
01_02_generating-password-variations-with-python.en.srt (19.7 KB)
files
2024-05-03 00:14:00
English
Seeders : 0 , Leechers : 0
Python Programming
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
udp://tracker.opentrackr.org:1337/announce
udp://tracker.torrent.eu.org:451/announce
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://tracker.dler.org:6969/announce
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series