MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Mastering Python - Networking and Security

Course Summary

Learn the ins and outs of scripting in Python and how to work with Python libraries for networking and forensics.


  • +

    Course Syllabus

    • Introduction
      • Important - Download These First - Working Files
      • Welcome
      • What We Will Cover
      • Getting And Installing Python
      • Integrated Development Environments
      • Python 2 Versus Python 3
      • How To Access Your Working Files
    • Python Refresher
      • Python Console
      • Creating And Running Scripts
      • Variables
      • Loops
      • Scoping
      • Subroutines
      • Conditional Statements
      • Calling To System
      • Using Threads
      • Parsing Arguments
      • Handling Exceptions
      • Installing Additional Packages
      • Classes
      • Instances
    • Networking
      • Network Byte Order
      • Name Server Lookups
      • Network Client
      • Network Server
      • Grabbing Banners
      • Simple HTTP Request
      • Capturing Packets
      • Reading Headers
      • Parsing PCAP Files
      • Creating Raw Packets With Scapy
      • Communicating With SSL
      • Talking To SMTP Servers
      • Talking To POP3 And IMAP Servers
      • FTP
      • Multicasting
      • UDP
      • Telnet Client
    • HTTP Programming
      • Authenticating
      • Setting The User Agent
      • Setting Cookies
      • Using A HEAD Request
      • Interfacing With Web Forms
      • Parsing Web Responses
      • Using Web Proxies
      • Downloading Files Via HTTP
      • Spidering
    • Security Scripting
      • Threaded Network Testing
      • Creating Alternate Data Streams
      • Fuzzing With Python
      • Debugging With Python
      • Steganography With Stepic
      • Encrypting And Decrypting Data
      • Hiding Encrypted Data With Steganography
      • Interacting With MySQL
      • Replaying Network Traffic
    • Forensic Scripting
      • Accessing Windows Registry - Part 1
      • Accessing Windows Registry - Part 2
      • Accessing MFT - Part 1
      • Accessing MFT - Part 2
      • Log Parsing
      • Analyzing The MBR
      • Reading Alternate Data Streams
      • Getting Process Lists
      • Getting Access To SQLite Databases
      • Accessing Browser Data Through SQLite
      • Getting Access To Recycle Bin
      • Walking A Filesystem
      • Finding Files By Time
    • Twisted Python
      • What Is Twisted?
      • Echo Server
      • Echo Client
      • HTTP client
    • Conclusion
      • Wrapping Up
      • What Is Next?


Course Fee:
USD 49

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top