BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This training course teaches students how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this course will teach students to create their own security defense using the Python programming language. This course demonstrates how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Program Level
Intermediate
Training Delivery Methods
Group Live
Duration
5 Days / 32 hours Training
CPE credits
26 NASBA CPE Credits
Field of Study
Information Technology
Advanced Prep
N/A
Course Registration
Candidates can choose to register for the course by via any of the below methods:
- Email: Sales@phoenixts.com
- Phone: 301-582-8200
- Website: www.phoenixts.com
Upon registration completion candidates are sent an automated course registration email that includes attachments with specific information on the class and location as well as pre-course study and test preparation material approved by the course vendor. The text of the email contains a registration confirmation as well as the location, date, time and contact person of the class.
Online enrolment closes three days before course start date.
On the first day of class, candidates are provided with instructions to register with the exam provider before the exam date.
Complaint Resolution Policy
To view our complete Complaint Resolution Policy policy please click here: Complaint Resolution Policy
Refunds and Cancellations
To view our complete Refund and Cancellation policy please click here: Refund and Cancellation Policy
Course Outline
Setting Up Your Python Environment
- nstalling Kali Linux
- WingIDE
The Network: Basics
- Python networking in a paragraph
- TCP Client
- UDP Client
- TCP Server
- Replacing Netcat
- Building a TCP Proxy
- SSH with
- SSH Tunneling
The Network: Raw Sockets and Sniffing
- Building a UDP Host Discovery Tool
- Packet Sniffing on Windows and Linux
- Decoding the IP Layer
- Decoding ICMP
Owning the Network with SCAPY
- Stealing Email Credentials
- ARP Cache Poisoning with SCAPY
- PCAP Processing
Web Hackery
- The Socket Library of the Web: urlib2
- Mapping Open Source Web App Installations
- Bruite-Forcing Directories and File Locations
- Bruite-Forcing HTML form authentication
Extending Burp Proxy
- Setting Up
- Burp Fuzzing
- Bing for Burp
- Turning Website Content into Password Gold
Github Command and Control
- Setting Up a GitHub Account
- Creating Modules
- Trojan Configuration
- Building a GitHub-Aware Trojan
Common Trojaning Tasks on Windows
- Keylogging for Fun and Keystrokes
- Taking Screenshots
- Pythonic Shellcode Execution
- Sandbox Detection
Fun with Internet Explorer
- Main n the Browser
- IE COM Automation for Exfiltration
Windows Privilege Escalation
- Installing the Prerequisites
- Create a Process Monitor
- Windows Taken Privileges
- Winning the Race
- Code Injection
Automating Offensive Forensics
- Installation
- Profiles
- Grabbing Password Hashes
- Direct Code Injection
Python Security for Practitioners Training FAQs
This course is intended for security professionals tasked with developing Python applications, Pen testers looking to expand their knowledge into building security tools, and technologists needing customized tool sets.
Students should have basic experience and understanding of any scripting or programming language.
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org