User log in
User registration
Registrations are closed. If you have an invitation code, click here, or join our twitter, we post invites often there.
Email: forgotten email?
Password: lost pass?
  Resend activation email
Protect your privacy! Use a VPN When Downloading Torrents
Your country is N/A. Your IP Address is 34.236.245.255.
Your Internet Provider is tracking your torrent activity! Hide your IP ADDRESS with a VPN!
We strongly recommend using NORD VPN to anonymize your torrenting.
Also, while you are using NORD you get No Ads for Demonoid members Get VPN Now! (68% off)
Details for PacktPub | Python for Automating Information Security [Video] [FCO]
Created by Ratio: 1.00SaM 1 month ago[ Add to bookmark ]
Miscellaneous
Lynda and other Courses >>> https://www.freecoursesonline.me/
For Developer Tools & Apps >>> https://ftuapps.com/
Forum for discussion >>> https://1hack.us/




By: Thomas McNeela
Released: May 2020
Course Source: https://www.packtpub.com/product/python-for-automating-information-security-video/9781838828219

Video Details

ISBN 9781838828219
Course Length 2 hours 38 minutes

About

The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.

In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!

By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.

All the code and supporting files for this course are available on GitHub at: https://github.com/PacktPublishing/Python-for-Automating-Information-Security

Author

Thomas McNeela

Thomas McNeela is an experienced information security professional and continuing-education instructor. Over his nine-year career, he has worked for several companies including Motorola Mobility and U.S. Cellular. Thomas specializes in network engineering and security, security assessments, threat intelligence, and automation. He earned a Master of Science (M.S.) degree in Information Systems from Northwestern University and holds many industry-recognized certifications including the CISSP and CEH (Master), and is currently working for information security software and services firm located in the Chicago area.

Facebook Twitter Digg Reddit LinkedIn StumbleUpon Email
Show Demonoid some love with BitCoin: 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk How to get BitCoins?
Peers: 27 seeders, 2 leechers, 732 total - Updated: 17 days ago [ Update now ]
Size: 572.20 MB 

Sponsored links
Related torrents
Torrents you may also like:
Download this torrent
Extra information
Tracker: udp://opentor.org:2710/announce
Torrent hash: 28E2EF17 9F043B4A 812744BC 2033870F FC5BC464
Files described inside the torrent: 41 [ Click here to show the full list ]
Comments
No comments posted yet

Disclaimer: None of the files shown here are actually hosted or transmitted by this server. The links are provided solely by this site's users. The site moderation is also a service provided by the site's users. The administrator of this site (demonoid.is) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

By using this site you indicate your agreement to our terms and conditions
   
Link to us | Contact us | API | Commemoration | Twitter: @DemonoidBT | Feeds/RSS | DMCA
This site and the Demonoid logo are Copyright © Demonoid. All rights reserved.

Show Demonoid some love with 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk