Overview
COURSE DESCRIPTION
Enter the world of ethical penetration testing with Python 3 in a safe and legal environment with the Python 3 for Offensive Pentest course on Courseinger. This course focuses on teaching you how to write effective scripts to automate scanning, vulnerability analysis, and security testing—with a strong emphasis on ethics and legal compliance.
You will learn the principles of designing testing tools, working with networks and sockets in general, analyzing responses, processing data, and how to build small utilities that facilitate the work of a cybersecurity team. The material is practical and focused on applications in simulated labs and does not provide instructions for use outside legal frameworks or for malicious purposes.
Course Features
- Lectures 41
- Quiz 0
- Duration Lifetime access
- Skill level Intermediate
- Language English
- Students 9
- Certificate Yes
- Assessments Yes
Curriculum
- 6 Sections
- 41 Lessons
- Lifetime
- Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence ShellTCP Reverse Shell Outline And Server Side - Coding a TCP Reverse Shell And Client Side - Coding a TCP Reverse Shell And Coding a Low Level Data Exfiltration And Exporting To EXE And HTTP Reverse Shell Outline And Coding a HTTP Reverse Shell And Data Exfiltration And Persistence Outline And Making our HTTP Reverse Shell Persistent And Tuning the connection attempts11
- 1.1TCP Reverse Shell Outline Lessons 15 Minutes
- 1.2Server Side – Coding a TCP Reverse Shell Lessons 28 Minutes
- 1.3Client Side – Coding a TCP Reverse Shell Lessons 39 Minutes
- 1.4Coding a Low Level Data Exfiltration Lessons 48 Minutes
- 1.5Exporting To EXE Lessons 53 Minutes
- 1.6HTTP Reverse Shell Outline Lessons 63 Minutes
- 1.7Coding a HTTP Reverse Shell Lessons 712 Minutes
- 1.8Data Exfiltration Lessons 88 Minutes
- 1.9Persistence Outline Lessons 95 Minutes
- 1.10Making our HTTP Reverse Shell Persistent Lessons 1011 Minutes
- 1.11Tuning the connection attempts Lessons 115 Minutes
- Python 3 Windows 10 Kali 2 Advanced Scriptable ShellDDNS Aware Shell And Interacting with Twitter And Target Directory Navigation And Replicating Metasploit Screen Capturing And Replicating Metasploit Searching for Content And Integrating Low Level Port Scanner6
- 2.1DDNS Aware Shell Lessons 16 Minutes
- 2.2Interacting with Twitter Lessons 210 Minutes
- 2.3Target Directory Navigation Lessons 37 Minutes
- 2.4Replicating Metasploit Screen Capturing Lessons 45 Minutes
- 2.5Replicating Metasploit Searching for Content Lessons 56 Minutes
- 2.6Integrating Low Level Port Scanner Lessons 66 Minutes
- Python 3 Windows 10 Kali 2 Catch Me If You Can!Bypassing Host Based Firewall Outline And Hijacking Internet Explorer - Shell Over Internet Explorer And Bypassing Reputation Filtering in Next Generation Firewalls - Outline And 005 Interacting with Source Forge And Interacting with Google Forms5
- 3.1Bypassing Host Based Firewall Outline Lessons 14 Minutes
- 3.2Hijacking Internet Explorer – Shell Over Internet Explorer Lessons 26 Minutes
- 3.3Bypassing Reputation Filtering in Next Generation Firewalls – Outline – Lessons 33 Minutes
- 3.4005 Interacting with Source Forge Lessons 46 Minutes
- 3.5Interacting with Google Forms – Lessons 55 Minutes
- Python 3 How Malware Abuse Cryptography Python AnswersBypassing IPS with Hand-Made XOR Encryption And Quick Introduction To Encryption Algorithms And Protecting Your Tunnel with AES And Protecting Your Tunnel with RSA And Developing One Time, Hybrid - Encryption Key Lessons5
- 4.1Bypassing IPS with Hand-Made XOR Encryption Lessons 18 Minutes
- 4.2Quick Introduction To Encryption Algorithms Lessons 28 Minutes
- 4.3Protecting Your Tunnel with AES Lessons 39 Minutes
- 4.4Protecting Your Tunnel with RSA Lessons 413 Minutes
- 4.5Developing One Time, Hybrid – Encryption Key Lessons 55 Minutes
- Python 3 Windows 10 Kali 2 Passwords HackingKeylogger And Hijacking KeePass Password Manager And Bonus Dumping Saved Passwords Out of Google Chrome And Bonus Exercise Dumping Saved Passwords Out of Google Chrome And 009 FireFox API Hooking with ImmunityDebugger And Python in Firefox PoC And Exercise Python in Firefox EXE And Passwords Phishing - DNS Poisoning And In Action Facebook Password Phishing And Don't Skip Me! - Countermeasures10
- 5.1Keylogger Lessons 13 Minutes
- 5.2Hijacking KeePass Password Manager Lessons 27 Minutes
- 5.3Bonus Dumping Saved Passwords Out of Google Chrome Lessons 315 Minutes
- 5.4Bonus Exercise Dumping Saved Passwords Out of Google Chrome Lessons 43 Minutes
- 5.5FireFox API Hooking with ImmunityDebugger Lessons 512 Minutes
- 5.6Python in Firefox PoC -Lessons 610 Minutes
- 5.7Exercise Python in Firefox EXE Lessons 77 Minutes
- 5.8Passwords Phishing – DNS Poisoning Lessons 811 Minutes
- 5.9In Action Facebook Password Phishing Lessons 911 Minutes
- 5.10Don’t Skip Me! – Countermeasures Lessons 107 Minutes
- Windows 7 & 10 Privilege Escalation - Weak Service PermissionPrivilege Escalation Part 1 - Weak Service File Permission Outline And Privilege Escalation Part 2 - Preparing Vulnerable Software And Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service And Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks4
- 6.1Privilege Escalation Part 1 – Weak Service File Permission Outline – Lessons 14 Minutes
- 6.2Privilege Escalation Part 2 – Preparing Vulnerable Software – Lessons 29 Minutes
- 6.3Privilege Escalation Part 3 – Backdoor-ing Legitmate Windows Service Lessons 314 Minutes
- 6.4Privilege Escalation Part 4 – Create a New Admin account & Erasing Tracks Lessons 45 Minutes
Instructor
Requirements
- Basic knowledge of Python 3 (variables, functions, loops). General understanding of networking and operating system concepts. A virtual environment such as VirtualBox or VMware for secure testing. A computer running Windows or Linux. A willingness to learn within the framework of ethical security and legal testing only.
Features
- Practical Python 3 training for ethical penetration testing applications. Practical projects within a secure virtual lab. Coverage of networking concepts, scanning, data collection, and results analysis. Ongoing guidance on cybersecurity ethics and laws. Updated content suitable for beginner to intermediate levels. Certification of completion from Courseinger upon successful completion of the final project.
Target audiences
- طلاب الأمن السيبراني والتحقيق الجنائي الرقمي. مختبرو الاختراق (Penetration Testers) المبتدئون الراغبون في فهم البرمجة الخلفية للأدوات. مطورو بايثون الذين يريدون توظيف مهاراتهم في أمن المعلومات. أي شخص مهتم بفهم كيفية أتمتة الفحوص الأمنية ضمن بيئة تعليمية آمنة.





