Python For Computer Networks And Cybersecurity

Posted By: ELK1nG

Python For Computer Networks And Cybersecurity
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 772.33 MB | Duration: 0h 58m

Computer networks , cybersecurity

What you'll learn

Fulfilling Pre-ATT&CK Objectives

Active Scanning, Scanning Networks with scapy

Implementing a SYN Scan in scapy, Performing a DNS Scan in scapy

Network Scanning for Defenders

Requirements

basic of python programming and computer network foundamentals

Description

An excellent starting point involves addressing the question, "Why should one embrace automation?" If you're already immersed in the cybersecurity realm, you're likely aware of the significant advantages automation brings. However, if you're new to the field, consider the challenge of safeguarding your less tech-savvy relatives or friends from malware installations on their phones or falling victim to phishing emails. Now, envision multiplying that struggle by hundreds or thousands of people. Factor in the reality that malicious actors are actively motivated to target your organization, and a single successful attack could result in millions of dollars in damages for the company. Managing cyber risk entails preventing malware infections, detecting and mitigating ongoing attacks, ensuring compliance with corporate security policies, and more. Automation serves as an ally by assisting in handling these tasks.Python boasts several features that make it a favorable choice, including the following:Popularity: There's a high likelihood that you are already familiar with Python to some extent. It's far easier to learn new ways to utilize a language you are already acquainted with than to start from scratch with a new language. Simplicity: Python is relatively quick and easy to grasp, even for those unfamiliar with it. This simplicity proves advantageous for both learning purposes and swiftly crafting programs.Power: Python boasts a plethora of robust libraries that can be effortlessly imported into your code. If you need to work with network traffic, utilizing libraries such as Scapy is much simpler than attempting to build the functionality from scratch.

Overview

Section 1: Введение

Lecture 1 Introduction

Section 2: Fulfilling Pre-ATT&CK Objectives

Lecture 2 Implementing a SYN Scan in scapy

Section 3: Network Scanning for Defenders

Lecture 3 Network Scanning for Defenders

Section 4: Gaining Initial Access_part3

Lecture 4 Gaining Initial Access

Section 5: File Transfer and Plotting_E1

Lecture 5 File Transfer and Plotting

Section 6: File Transfer and Plotting_Exercise2

Lecture 6 File Transfer and Plotting_E1

Computer science professionals