In this python tutorial, we start with the basics and work our way up to building cybersecurity algorithms. Time stamps are below.
**************************
Hackaholics Anonymous
**************************
By joining the Hackaholics Anonymous community, you'll get direct access to me, a community of supportive likeminded individuals, and exclusive perks like:
- Bug Bounties
- Python Automations for CySec, PenTesting, SysAdmin
- Exclusive Content
- Live Chats / Q&A's / AMA's
- And much, much more!
**********
*******
*****
***
*
**************************
Protect Yourself
**************************
Want an all-in-one AntiVirus/VPN $0.07 per day?
- SurfShark Link (VPN & AntiVirus For Unlimited Devices For $2.20/mo):
---
**************************
Join TryHackMe
**************************
Wanna practice hacking without getting caught?
- TryHackMe Discount Link:
---
Python For Cybersecurity Timestamps:00:00 1. Intro
01:25 Hackaholics Anonymous
02:26 Notes About Installation
03:53 2. Installing Python
06:02 2a. IDLE
12:27 3. PyCharm IDE
16:32 4. How to Install Libraries / Modules
21:56 5. Comments & Readability
28:10 6. Your First Program
32:59 7. Python Data Types
33:21 7a. Strings
35:20 7b. Lists
37:12 7c. Integers
38:59 7d. Floats
42:14 7d1. Intro to Mathematical Operators
43:39 7e. Booleans
45:38 7f. Tuples
47:29 7h. Dictionaries
49:53 8. Variables
56:34 8a. First Basic Script
01:00:48 9. Conditional Statements
01:15:04 9a. Comparative Operators
01:28:14 10. Iterative Statements (For Loops)
01:34:01 10a. Using For Loops to Repeat Actions
01:46:17 10b. Iterative Statements (While Loops)
01:53:10 10c. While Loops CySec Ex. 1
10:57:07 10d. While Loops CySec Ex. 2
02:00:50 10e. While Loops - Break and Continue
02:07:10 11. Functions Intro
02:17:44 11a. Creating an Investigation Function
02:28:04 11b. Creating a Conversion Function
02:34:54 11c. Functions and Parameters
02:41:38 11d. Retrieving Data From Functions (Return)
02:52:04 12. Built-In Function - print()
02:54:36 12a. Built-In Function - type()
02:56:48 12c. Built-In Function - max() min()
02:57:49 12d. Built-In Function - sorted()
03:00:39 12e. Building Your First Algorithm
03:10:23 13. String Operations
03:10:58 13a. Convert Integer Into String
03:12:30 13b. Get Length of a String
03:14:22 13c. Concatenation of String
03:15:26 13d. Upper/Lower/Title Strings
03:17:16 13e. String Indices
03:19:42 13f. String Slices
03:25:54 13g. Building a Password Analyzer
03:28:08 13h. Finding Substrings Inside Strings
03:30:19 13i. Building An Employee-ID Generator
03:37:31 13j. Building a URL Analyzer
03:44:22 14. List Operations
03:45:50 14a. Concatenate Lists
03:46:45 14b. Change Elements of a List
03:49:24 14c. Remove Items From a List
03:50:12 14d. The Pieces of An Algorithm
03:56:49 14e. Writing a Simple Algorithm
04:16:13 15. Regular Expressions in Python
04:24:11 15a. Using RegEx to Find Email Addresses
04:31:24 15b. Using the re Python Module
04:50:38 15c. RegEx Device Detection Algorithm
04:52:55 15d. RegEx Log Analysis Algorithm
05:00:10 15e. RegEx IP Detection Algorithm
05:07:18 16. Working With Files
05:10:36 16a. Open & Reading a File
05:15:09 16b. Writing to a File
05:20:57 16c. Adding to a File
05:24:16 17. Parsing a File - .split()
05:30:38 17a. Parsing a File - .join()
05:36:14 17b. Exercise - Updating a File
05:41:13 17c. Exercise - Creating a File
05:45:02 18. Algorithms
05:46:42 18a. Building a Parsing Algorithm
06:04:27 18b. Converting Our Algorithm Into a Reusable Function
06:06:29 18c. Final Review
06:12:06 Conclusion
06:16:21 Hackaholics Anonymous
Смотрите видео Build Python Algorithms For Cybersecurity - Python Tutorial онлайн без регистрации, длительностью 06 часов 17 минут 27 секунд в хорошем hd качестве. Это видео добавил пользователь Hank Hackerson 10 Сентябрь 2024, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 12 раз и оно понравилось 2 людям.