Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security - Python and Web Applications
Introduction
Course Introduction (3:03)
Course Work Overview (6:26)
Sample Tool 1 - Log Analyzer (10:22)
Sample Tool 1 - Text Instructions
Sample Tool 2 - Password Checker (7:26)
Sample Tool 2 - Text Instructions
Development Environment Overview (5:00)
Important course updates - don't skip!
Cyber Security
Cyber Security: Introduction to Section 2 (0:45)
What is Cyber Security? (8:03)
Cyber Security Introduction Quiz
Explaining the Methodology (7:12)
Methodology Quiz
Intro to Python and Python Crash Course
repl.it Introduction (6:33)
Basics Review
Penetration Testing - Overview (5:31)
Penetration Testing - Code Example (5:27)
Penetration Testing - Text Instructions
Penetration Testing - Remediation (8:28)
Penetration Testing Quiz
Port Scanning - Overview (4:29)
Port Scanning - Code Examples (3:38)
Port Scanning - Text Instructions
Port Scanning - Remediation (3:51)
Port Scanning Quiz
Botnets - Overview (6:01)
Botnets - Code Example (5:06)
Botnets - Code Example Continued (5:04)
Botnets - Text Instructions
Botnets - Remediation (12:15)
Cyber Security Topics Review 1
Code Exploits - Overview (4:51)
Code Exploits - Code Example (5:33)
Code Exploits - Text Instructions
Code Exploits - Remediation (3:55)
Forensic Investigations (5:31)
Forensic Investigations - Code Example (8:29)
Forensic Investigations - Text Instructions
Forensic Investigations - Remediation (5:09)
Network Traffic Analysis - Overview (5:11)
Network Traffic Analysis - Code Example (4:28)
Network Traffic Analysis - Text Instructions
Network Traffic Analysis - Remediation (3:43)
Cyber Security Topics Review 2
Wireless - Overview (4:33)
Wireless - Code Example (3:08)
Wireless - Text Instructions
Wireless - Remediation (9:58)
Web Reconnaissance - Overview (5:31)
Web Reconnaissance - Code Example (9:36)
Web Reconnaissance - Text Instructions
Web Reconnaissance - Remediation (6:30)
Antivirus Evasion - Overview (5:39)
Antivirus Evasion - Code Example (7:02)
Antivirus Evasion - Text Instructions
Antivirus Evasion - Remediation (3:33)
Social Engineering - Overview (6:57)
Social Engineering - Code Example (4:30)
Social Engineering - Text Instructions
Social Engineering - Remediation (2:56)
Cyber Security Topics Review 3
Building a Security Tool
Intro to Section 3: Building your own security tool (1:15)
Installing Python Locally - Text Instructions
Tool Development with Python - Overview (4:54)
Introduction to Pip (3:55)
Introduction to Pip - Text Instructions
Basic Python Script (3:24)
Basic Python Script - Text Instructions
Command Line Arguments (3:16)
Command Line Arguments - Text Instructions
Argument Parsing (6:29)
Argument Parsing - Text Instructions
Python Tools Review 1
Validating Input (3:37)
Validating Input - Text Instructions
Sending Requests to the Web (2:40)
Sending Requests to the Web - Text Instructions
Parsing Results (6:43)
Parsing Results - Text Instructions
Checking Forms (4:31)
Checking Forms - Text Instructions
Python Tools Review 2
Generating the Report (2:19)
Generating the Report - Text Instructions
Checking Comments (6:32)
Checking Comments - Text Instructions
Checking Inputs (5:12)
Checking Inputs - Text Instructions
Improving the Report (2:57)
Improving the Report - Text Instructions
Using Config Settings (7:16)
Using Config Settings - Text Instructions
Configuration from File (3:42)
Configuration from File - Text Instructions
Merging the Configs (2:09)
Merging the Configs - Text Instructions
Outputting the Report (8:36)
Outputting the Report - Text Instructions
Python Tools Review 3
Pushing to GitHub (4:29)
Pushing to Github - Text Instructions
Testing the Python Tool (6:05)
Writing the Documentation (6:24)
Distributing Your Tool (5:48)
Python Tools Review 4
Web Application Security
Section 4 Introduction (1:17)
Web Application Security Introduction (6:00)
OWASP Overview (4:37)
Introduction to the OWASP Top 10 List (1:27)
Rails Overview (3:14)
PHP Overview (5:08)
Installing Rails and PHP
OWASP Top 10 Vulnerabilities Example Code - Where to get it
Command Injection - Overview (4:48)
Command Injection - Rails Example (6:44)
Command Injection - Rails Example - Text Instructions
Command Injection - PHP Example (4:10)
Command Injection - PHP Example - Text Instructions
SQL Injection - Overview (6:25)
SQL Injection - Rails Example (3:59)
SQL Injection - Rails Example - Text Instructions
SQL Injection - PHP Example (3:31)
SQL Injection - PHP Example - Text Instructions
SQL Injection - PHP Example - Remediation (2:26)
Password Complexity - Overview (6:46)
Password Complexity - Rails Example (6:50)
Password Complexity - Rails Example - Text Instructions
Password Complexity - PHP Example (6:28)
Password Complexity - PHP Example - Text Instructions
Information Leakage - Overview (4:56)
Information Leakage - Rails Example (3:07)
Information Leakage - Rails Example - Text Instructions
Information Leakage - PHP Example (7:13)
Information Leakage - PHP Example - Text Instructions
Sensitive Data Exposure - Overview (4:53)
Sensitive Data Exposure - Rails Example (4:23)
Sensitive Data Exposure - Rails Example - Text Instructions
Sensitive Data Exposure - PHP Example (2:54)
Sensitive Data Exposure - PHP Example - Text Instructions
Web Application Security Review 1
XML External Entities (XXE) - Overview (4:40)
XML External Entities (XXE) - Rails Example (4:36)
XML External Entities (XXE) - Rails Example - Text Instructions
XML External Entities (XXE) - PHP Example (4:28)
XML External Entities (XXE) - PHP Example - Text Instructions
Broken Access Control - Overview (5:12)
Broken Access Control - Rails Example (11:56)
Broken Access Control - Rails Example - Text Instructions
Broken Access Control - PHP Example (3:39)
Broken Access Control - PHP Example - Text Instructions
Security Misconfiguration - Overview (5:50)
Security Misconfiguration - Rails Example (3:46)
Security Misconfiguration - Rails Example - Text Instructions
Security Misconfiguration - PHP Example (3:28)
Security Misconfiguration - PHP Example - Text Instructions
Web Application Security Review 2
Cross-Site Scripting (XSS) - Overview (1:34)
Cross-Site Scripting (XSS) - Rails Example (5:09)
Cross-Site Scripting (XSS) - Rails Example - Text Instructions
Cross-Site Scripting (XSS) - PHP Example (5:50)
Cross-Site Scripting (XSS) - PHP Example - Text Instructions
Insecure Deserialization - Overview (3:46)
Insecure Deserialization - Rails Example (5:18)
Insecure Deserialization - Rails Example - Text Instructions
Insecure Deserialization - PHP Example (7:22)
Insecure Deserialization - PHP Example - Text Instructions
Using Components with Known Vulnerabilities - Overview (5:28)
Using Components with Known Vulnerabilities - Rails Example (11:01)
Using Components with Known Vulnerabilities - Rails Example - Text Instructions
Using Components with Known Vulnerabilities - PHP Example (4:38)
Using Components with Known Vulnerabilities - PHP Example - Text Instructions
Insufficient Logging and Monitoring - Overview (4:06)
Insufficient Logging and Monitoring - Rails Example (5:49)
Insufficient Logging and Monitoring - Rails Example - Text Instructions
Insufficient Logging and Monitoring - PHP Example (6:14)
Insufficient Logging and Monitoring - PHP Example - Text Instructions
Web Application Security Review 3
Web Security Analysis Tool (9:17)
Bonus Material
Multi-Factor Authentication (16:35)
Ethical Hacking (5:08)
Password Complexity (11:18)
Physical Security (10:31)
Data Breaches (9:34)
Cloud Security (11:44)
Summary
Appendix A: Acknowledgements
Appendix B: Glossary
Thank you! (1:07)
Python crash course
Installation and expectations
Strings
Numbers
List, Tuples and Sets
Dictionaries
Branching and Functions/Methods
Standard library and imports
Object Oriented Programming (OOP)
Course Work Overview
An overview of what we will be covering in this course and how it is structured.
Complete and Continue