糖心vlog官网观看

Packt
Exploit Development, Malware, & Defensive Strategies
Packt

Exploit Development, Malware, & Defensive Strategies

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

14 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans
Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

14 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans

What you'll learn

  • Develop advanced Python scripts using Object-Oriented Programming for ethical hacking tasks

  • Create backdoors, keyloggers, and network exploits for penetration testing

  • Package and disguise malicious files to bypass security systems and execute attacks

  • Implement defensive strategies against MITM attacks, packet listeners, and other network exploits

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

May 2025

Assessments

10 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the The Complete Ethical Hacking Course Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
糖心vlog官网观看 Career Certificate

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

糖心vlog官网观看 Career Certificate

There are 10 modules in this course

In this module, we will introduce Object-Oriented Programming (OOP) concepts, including classes, methods, and inheritance in Python. You'll learn how to apply these principles to build efficient and reusable hacking tools while also mastering error handling techniques.

What's included

8 videos2 readings1 assignment

In this module, we will explore the world of Python modules, focusing on how to write, use, and manage them to streamline your ethical hacking scripts. You'll also learn the benefits of using external libraries and the key differences between running scripts directly and importing them.

What's included

5 videos1 assignment

In this module, we will cover the essentials of MAC address manipulation, including how to change MAC addresses for anonymity. You鈥檒l gain hands-on experience with Python, using subprocess and regex techniques to automate the process and enhance your security practices.

What's included

13 videos1 assignment

In this module, we will introduce network scanning techniques, focusing on ARP and broadcast requests to identify devices on a network. You'll also enhance your scanning scripts with new features and ensure they are compatible with Python 3 for more effective cybersecurity assessments.

What's included

9 videos1 assignment

In this module, we will delve into the tactics behind MITM attacks, demonstrating how to intercept network traffic using ARP poisoning. You will learn how to script these attacks effectively, incorporating error handling and user input for more sophisticated MITM scenarios.

What's included

10 videos1 assignment

In this module, we will dive into packet listening and analysis using Wireshark and Python. You鈥檒l also learn techniques for securing your network traffic against potential listeners while mastering the intricacies of network packet analysis.

What's included

8 videos1 assignment

In this module, we will cover the creation of a keylogger using Python, focusing on capturing and logging keystrokes. You鈥檒l also learn how to save, send, and optimize keyloggers, with an emphasis on ethical considerations and proper testing.

What's included

10 videos1 assignment

In this module, we will explore backdoor creation, from writing the backdoor script to developing a listener for remote access. You鈥檒l learn how to interact with target systems, retrieve data, and upload files, with an emphasis on error handling and Python 3 compatibility.

What's included

19 videos1 assignment

In this module, we will explore how to package and disguise malicious files for deployment, focusing on techniques like changing icons and file extensions. You鈥檒l also learn how to create executable payloads and configure them for persistence in compromised systems.

What's included

10 videos1 assignment

In this final module, we will close the course with parting thoughts on the importance of ethical hacking practices. You will be guided towards responsible cybersecurity endeavors and provided with key resources to continue your learning journey.

What's included

1 video1 reading1 assignment

Instructor

Packt - Course Instructors
Packt
709 Courses106,974 learners

Offered by

Packt

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."

Career resources

糖心vlog官网观看 Plus

Unlock access to 10,000+ courses with a subscription

Explore roles and skills, learn more effectively with 糖心vlog官网观看 Coach, and earn recognized credentials

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions