Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security - Python and Web Applications
Introduction
Course Introduction (3:03)
Course Work Overview (6:26)
Sample Tool 1 - Log Analyzer (10:22)
Sample Tool 1 - Text Instructions
Sample Tool 2 - Password Checker (7:26)
Sample Tool 2 - Text Instructions
Development Environment Overview (5:00)
Important course updates - don't skip!
Cyber Security
Cyber Security: Introduction to Section 2 (0:45)
What is Cyber Security? (8:03)
Cyber Security Introduction Quiz
Explaining the Methodology (7:12)
Methodology Quiz
Intro to Python and Python Crash Course
repl.it Introduction (6:33)
Basics Review
Penetration Testing - Overview (5:31)
Penetration Testing - Code Example (5:27)
Penetration Testing - Text Instructions
Penetration Testing - Remediation (8:28)
Penetration Testing Quiz
Port Scanning - Overview (4:29)
Port Scanning - Code Examples (3:38)
Port Scanning - Text Instructions
Port Scanning - Remediation (3:51)
Port Scanning Quiz
Botnets - Overview (6:01)
Botnets - Code Example (5:06)
Botnets - Code Example Continued (5:04)
Botnets - Text Instructions
Botnets - Remediation (12:15)
Cyber Security Topics Review 1
Code Exploits - Overview (4:51)
Code Exploits - Code Example (5:33)
Code Exploits - Text Instructions
Code Exploits - Remediation (3:55)
Forensic Investigations (5:31)
Forensic Investigations - Code Example (8:29)
Forensic Investigations - Text Instructions
Forensic Investigations - Remediation (5:09)
Network Traffic Analysis - Overview (5:11)
Network Traffic Analysis - Code Example (4:28)
Network Traffic Analysis - Text Instructions
Network Traffic Analysis - Remediation (3:43)
Cyber Security Topics Review 2
Wireless - Overview (4:33)
Wireless - Code Example (3:08)
Wireless - Text Instructions
Wireless - Remediation (9:58)
Web Reconnaissance - Overview (5:31)
Web Reconnaissance - Code Example (9:36)
Web Reconnaissance - Text Instructions
Web Reconnaissance - Remediation (6:30)
Antivirus Evasion - Overview (5:39)
Antivirus Evasion - Code Example (7:02)
Antivirus Evasion - Text Instructions
Antivirus Evasion - Remediation (3:33)
Social Engineering - Overview (6:57)
Social Engineering - Code Example (4:30)
Social Engineering - Text Instructions
Social Engineering - Remediation (2:56)
Cyber Security Topics Review 3
Building a Security Tool
Intro to Section 3: Building your own security tool (1:15)
Installing Python Locally - Text Instructions
Tool Development with Python - Overview (4:54)
Introduction to Pip (3:55)
Introduction to Pip - Text Instructions
Basic Python Script (3:24)
Basic Python Script - Text Instructions
Command Line Arguments (3:16)
Command Line Arguments - Text Instructions
Argument Parsing (6:29)
Argument Parsing - Text Instructions
Python Tools Review 1
Validating Input (3:37)
Validating Input - Text Instructions
Sending Requests to the Web (2:40)
Sending Requests to the Web - Text Instructions
Parsing Results (6:43)
Parsing Results - Text Instructions
Checking Forms (4:31)
Checking Forms - Text Instructions
Python Tools Review 2
Generating the Report (2:19)
Generating the Report - Text Instructions
Checking Comments (6:32)
Checking Comments - Text Instructions
Checking Inputs (5:12)
Checking Inputs - Text Instructions
Improving the Report (2:57)
Improving the Report - Text Instructions
Using Config Settings (7:16)
Using Config Settings - Text Instructions
Configuration from File (3:42)
Configuration from File - Text Instructions
Merging the Configs (2:09)
Merging the Configs - Text Instructions
Outputting the Report (8:36)
Outputting the Report - Text Instructions
Python Tools Review 3
Pushing to GitHub (4:29)
Pushing to Github - Text Instructions
Testing the Python Tool (6:05)
Writing the Documentation (6:24)
Distributing Your Tool (5:48)
Python Tools Review 4
Web Application Security
Section 4 Introduction (1:17)
Web Application Security Introduction (6:00)
OWASP Overview (4:37)
Introduction to the OWASP Top 10 List (1:27)
Rails Overview (3:14)
PHP Overview (5:08)
Installing Rails and PHP
OWASP Top 10 Vulnerabilities Example Code - Where to get it
Command Injection - Overview (4:48)
Command Injection - Rails Example (6:44)
Command Injection - Rails Example - Text Instructions
Command Injection - PHP Example (4:10)
Command Injection - PHP Example - Text Instructions
SQL Injection - Overview (6:25)
SQL Injection - Rails Example (3:59)
SQL Injection - Rails Example - Text Instructions
SQL Injection - PHP Example (3:31)
SQL Injection - PHP Example - Text Instructions
SQL Injection - PHP Example - Remediation (2:26)
Password Complexity - Overview (6:46)
Password Complexity - Rails Example (6:50)
Password Complexity - Rails Example - Text Instructions
Password Complexity - PHP Example (6:28)
Password Complexity - PHP Example - Text Instructions
Information Leakage - Overview (4:56)
Information Leakage - Rails Example (3:07)
Information Leakage - Rails Example - Text Instructions
Information Leakage - PHP Example (7:13)
Information Leakage - PHP Example - Text Instructions
Sensitive Data Exposure - Overview (4:53)
Sensitive Data Exposure - Rails Example (4:23)
Sensitive Data Exposure - Rails Example - Text Instructions
Sensitive Data Exposure - PHP Example (2:54)
Sensitive Data Exposure - PHP Example - Text Instructions
Web Application Security Review 1
XML External Entities (XXE) - Overview (4:40)
XML External Entities (XXE) - Rails Example (4:36)
XML External Entities (XXE) - Rails Example - Text Instructions
XML External Entities (XXE) - PHP Example (4:28)
XML External Entities (XXE) - PHP Example - Text Instructions
Broken Access Control - Overview (5:12)
Broken Access Control - Rails Example (11:56)
Broken Access Control - Rails Example - Text Instructions
Broken Access Control - PHP Example (3:39)
Broken Access Control - PHP Example - Text Instructions
Security Misconfiguration - Overview (5:50)
Security Misconfiguration - Rails Example (3:46)
Security Misconfiguration - Rails Example - Text Instructions
Security Misconfiguration - PHP Example (3:28)
Security Misconfiguration - PHP Example - Text Instructions
Web Application Security Review 2
Cross-Site Scripting (XSS) - Overview (1:34)
Cross-Site Scripting (XSS) - Rails Example (5:09)
Cross-Site Scripting (XSS) - Rails Example - Text Instructions
Cross-Site Scripting (XSS) - PHP Example (5:50)
Cross-Site Scripting (XSS) - PHP Example - Text Instructions
Insecure Deserialization - Overview (3:46)
Insecure Deserialization - Rails Example (5:18)
Insecure Deserialization - Rails Example - Text Instructions
Insecure Deserialization - PHP Example (7:22)
Insecure Deserialization - PHP Example - Text Instructions
Using Components with Known Vulnerabilities - Overview (5:28)
Using Components with Known Vulnerabilities - Rails Example (11:01)
Using Components with Known Vulnerabilities - Rails Example - Text Instructions
Using Components with Known Vulnerabilities - PHP Example (4:38)
Using Components with Known Vulnerabilities - PHP Example - Text Instructions
Insufficient Logging and Monitoring - Overview (4:06)
Insufficient Logging and Monitoring - Rails Example (5:49)
Insufficient Logging and Monitoring - Rails Example - Text Instructions
Insufficient Logging and Monitoring - PHP Example (6:14)
Insufficient Logging and Monitoring - PHP Example - Text Instructions
Web Application Security Review 3
Web Security Analysis Tool (9:17)
Bonus Material
Multi-Factor Authentication (16:35)
Ethical Hacking (5:08)
Password Complexity (11:18)
Physical Security (10:31)
Data Breaches (9:34)
Cloud Security (11:44)
Summary
Appendix A: Acknowledgements
Appendix B: Glossary
Thank you! (1:07)
Python crash course
Installation and expectations
Strings
Numbers
List, Tuples and Sets
Dictionaries
Branching and Functions/Methods
Standard library and imports
Object Oriented Programming (OOP)
Insecure Deserialization - Overview
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock