Build Python Algorithms For Cybersecurity - Python Tutorial

Published: 10 September 2024
on channel: Hank Hackerson
124
21

In this python tutorial, we start with the basics and work our way up to building cybersecurity algorithms. Time stamps are below.

**************************
Hackaholics Anonymous
**************************
By joining the Hackaholics Anonymous community, you'll get direct access to me, a community of supportive likeminded individuals, and exclusive perks like:
- Bug Bounties
- Python Automations for CySec, PenTesting, SysAdmin
- Exclusive Content
- Live Chats / Q&A's / AMA's
- And much, much more!

**********
*******
*****
***
*
**************************
Protect Yourself
**************************
Want an all-in-one AntiVirus/VPN $0.07 per day?
- SurfShark Link (VPN & AntiVirus For Unlimited Devices For $2.20/mo):
---
**************************
Join TryHackMe
**************************
Wanna practice hacking without getting caught?
- TryHackMe Discount Link:
---

Python For Cybersecurity Timestamps:00:00 1. Intro
01:25 Hackaholics Anonymous
02:26 Notes About Installation
03:53 2. Installing Python
06:02 2a. IDLE
12:27 3. PyCharm IDE
16:32 4. How to Install Libraries / Modules
21:56 5. Comments & Readability
28:10 6. Your First Program
32:59 7. Python Data Types
33:21 7a. Strings
35:20 7b. Lists
37:12 7c. Integers
38:59 7d. Floats
42:14 7d1. Intro to Mathematical Operators
43:39 7e. Booleans
45:38 7f. Tuples
47:29 7h. Dictionaries
49:53 8. Variables
56:34 8a. First Basic Script
01:00:48 9. Conditional Statements
01:15:04 9a. Comparative Operators
01:28:14 10. Iterative Statements (For Loops)
01:34:01 10a. Using For Loops to Repeat Actions
01:46:17 10b. Iterative Statements (While Loops)
01:53:10 10c. While Loops CySec Ex. 1
10:57:07 10d. While Loops CySec Ex. 2
02:00:50 10e. While Loops - Break and Continue
02:07:10 11. Functions Intro
02:17:44 11a. Creating an Investigation Function
02:28:04 11b. Creating a Conversion Function
02:34:54 11c. Functions and Parameters
02:41:38 11d. Retrieving Data From Functions (Return)
02:52:04 12. Built-In Function - print()
02:54:36 12a. Built-In Function - type()
02:56:48 12c. Built-In Function - max() min()
02:57:49 12d. Built-In Function - sorted()
03:00:39 12e. Building Your First Algorithm
03:10:23 13. String Operations
03:10:58 13a. Convert Integer Into String
03:12:30 13b. Get Length of a String
03:14:22 13c. Concatenation of String
03:15:26 13d. Upper/Lower/Title Strings
03:17:16 13e. String Indices
03:19:42 13f. String Slices
03:25:54 13g. Building a Password Analyzer
03:28:08 13h. Finding Substrings Inside Strings
03:30:19 13i. Building An Employee-ID Generator
03:37:31 13j. Building a URL Analyzer
03:44:22 14. List Operations
03:45:50 14a. Concatenate Lists
03:46:45 14b. Change Elements of a List
03:49:24 14c. Remove Items From a List
03:50:12 14d. The Pieces of An Algorithm
03:56:49 14e. Writing a Simple Algorithm
04:16:13 15. Regular Expressions in Python
04:24:11 15a. Using RegEx to Find Email Addresses
04:31:24 15b. Using the re Python Module
04:50:38 15c. RegEx Device Detection Algorithm
04:52:55 15d. RegEx Log Analysis Algorithm
05:00:10 15e. RegEx IP Detection Algorithm
05:07:18 16. Working With Files
05:10:36 16a. Open & Reading a File
05:15:09 16b. Writing to a File
05:20:57 16c. Adding to a File
05:24:16 17. Parsing a File - .split()
05:30:38 17a. Parsing a File - .join()
05:36:14 17b. Exercise - Updating a File
05:41:13 17c. Exercise - Creating a File
05:45:02 18. Algorithms
05:46:42 18a. Building a Parsing Algorithm
06:04:27 18b. Converting Our Algorithm Into a Reusable Function
06:06:29 18c. Final Review
06:12:06 Conclusion
06:16:21 Hackaholics Anonymous


Watch video Build Python Algorithms For Cybersecurity - Python Tutorial online without registration, duration 06 hours 17 minute 27 second in high hd quality. This video was added by user Hank Hackerson 10 September 2024, don't forget to share it with your friends and acquaintances, it has been viewed on our site 124 once and liked it 21 people.