Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Ethical Hacking Course 2.0 Python & Kali Linux
01-introduction
002-introduction (11:23)
001-welcome (2:53)
003-why-program (14:12)
02-the-basics-of-python
005-downloading-python (10:43)
006-python-interpreter-and-idle (14:22)
007-nuts-and-bolts-of-a-sample-program (14:57)
03-basic-python-programming
008-python-strings (18:09)
009-getting-input (17:09)
010-reading-and-writing-files-part-1 (8:52)
011-reading-and-writing-files-part-2 (12:16)
012-python-expressions (13:00)
04-functions-in-python-programming
013-creating-your-first-program-part-1 (11:52)
014-creating-your-first-program-part-2 (14:19)
015-placing-comments-in-code (11:53)
016-introduction-to-strings-part-1 (10:02)
017-introduction-to-strings-part-2 (10:01)
018-what-are-functions (19:03)
019-print-function (5:19)
020-escape-codes (10:52)
021-input-function (18:40)
05-python-variables-and-lists
022-global-variables (8:46)
023-concept-of-dictionaries (16:55)
024-concepts-of-lists (16:10)
025-what-are-tuples (13:48)
06-python-conditionals
026-introduction-to-loops-part-1 (12:09)
027-introduction-to-loops-part-2 (9:10)
028-working-with-graphics (10:25)
029-conditional-execution (9:56)
030-if-statement (14:29)
031-additional-if-statements (12:15)
032-the-while-loop (13:49)
07-projects
033-project-a (18:19)
034-project-b (13:42)
035-conclusion (2:51)
08-ethical-hacking-inroduction
036-ethical-hacking-course-introduction (5:04)
09-penetration-testing
037-what-is-penetration-testing (8:25)
038-five-phases-of-penetration-testing (6:51)
10-downloading-and-installing-important-softwares
039-building-a-web-server (16:51)
040-installing-virtual-box (5:06)
041-downloading-and-installing-kali-linux (14:51)
042-downloading-python-kali-linux (7:43)
043-installing-wing-ide-editor (7:02)
11-python-and-kali-linux
044-first-penetration-program-using-python (15:24)
045-tcp-client-in-python (7:49)
046-tcp-service-in-python (7:28)
047-raw-binary-packets (7:35)
048-port-scanning-using-nmap (15:24)
12-sql-mapping
049-sniffing-part-1 (5:06)
050-sniffing-part-2 (16:11)
051-sql-injection-part-1 (16:38)
052-sql-injection-part-2 (15:31)
053-sql-injection-part-3 (11:56)
054-sql-injection-part-4 (10:09)
055-brute-force-part-1 (16:00)
056-brute-force-part-2 (10:32)
13-course-wrap-up
064-course-conclusion (2:29)
Teach online with
037-what-is-penetration-testing
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock