Complete Ethical Hacking Bootcamp 2023: Zero to Mastery

Learn Ethical Hacking + Penetration Testing! Use real techniques by black hat hackers then learn to defend against them!

Beginner 0(0 Ratings) 0 Students enrolled English
Created by Class Express
Last updated Fri, 20-Oct-2023
+ View more
Course overview

Just updated with all modern ethical hacking tools and best practices for 2023! Join a live online community of over 900,000+ students and a course taught by industry experts. This course will take you from absolute beginning of setting up your own hacking lab (like Kali Linux) on your machine, all the way to becoming a security expert that is able to use all the hacking techniques used by hackers and defend against them!

Whether you are a complete beginner looking to become an ethical hacker, or you’re a student looking to learn about securing computer systems, or you are a programmer who is looking to improve their security online and prevent attacks from hackers on your website, this course will dive you into the world of hacking and penetration testing. We even teach you Python programming from scratch for those that want to learn to program their own tools for hacking and penetration testing.


This course is focused on learning by doing. We are going to teach you how hacking works by actually practicing the techniques and methods used by hackers today. We will start off by creating our hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and once we have our computers set up for ethical hacking, then we dive into topics like:


1. HACKING LAB - In this section we are building our own lab where we can perform our attacks (You will be able to use your Mac, Windows, Linux operating systems don't worry!). What this lab essentially is, is a virtual machine that we will use for hacking (Kali Linux) and throughout the course we also create additional virtual *vulnerable* machines that we can practice our attacks on. The reason we use virtual machines is because we are not allowed to test our attacks on real life websites and networks so we create our own environment to do that.

  • Downloading Virtual Box & Kali Linux

  • Creating Our First Virtual Machine

  • Installing Kali Linux Operating System

  • 5 Stages Of A Penetration Test

  • Navigating Through Kali Linux System

  • Creating Files & Managing Directories

  • Network Commands & Sudo Privileges In Kali


2. OPTIONAL: PYTHON 101 - Learn python 3 programming from scratch. This section is not mandatory and is optional for those that want to learn to programming so you are able to build your own ethical hacking tools!

  • Learn Python Basics

  • Learn Python Intermediate

  • Learn Python: Error Handling

  • Learn Python: File I/O


3. RECONNAISSANCE  - Here we learn what we call Footprinting, or in other words, Information Gathering. Once we choose our target, our first task is to gain as much information about the target as possible.

  • What is Information Gathering ?

  • Obtaining IP Address, Physical Address Using Whois Tool

  • Whatweb Stealthy Scan

  • Aggressive Website Technology Discovering on IP Range

  • Gathering Emails Using theHarvester & Hunterio

  • How To Download Tools Online

  • Finding Usernames With Sherlock

  • Bonus - Email Scraper Tool In Python 3

  • More About Information Gathering


4. SCANNING - This is where things get real. In this section, we also gather information but we try to gather only technical information (i.e. if they have open ports, if they have a firewall, what softwares they are running on those open ports, what operating system do they have, is it an outdated operating system, etc.).

  • Theory Behind Scanning

  • TCP & UDP

  • Installing Vulnerable Virtual Machine

  • Netdiscover

  • Performing First Nmap Scan

  • Different Nmap Scan Types

  • Discovering Target Operating System

  • Detecting Version Of Service Running On An Open Port

  • Filtering Port Range & Output Of Scan Results

  • What is a Firewall/IDS ?

  • Using Decoys and Packet Fragmentation

  • Security Evasion Nmap Options

  • Note: Time To Switch Things Up!

  • Python Coding Project - Port Scanner


5. VULNERABILITY ANALYSIS - In this section we use the information that we gathered from scanning (such as softwares that the target has running on open ports) and with this information, we try to determine whether there is any known vulnerabilities.

  • Finding First Vulnerability With Nmap Scripts

  • Manual Vulnerability Analysis & Searchsploit

  • Nessus Installation

  • Discovering Vulnerabilities With Nessus

  • Scanning Windows 7 Machine With Nessus


6. EXPLOITATION & GAINING ACCESS  This is the exciting part of the course. This is where we attack and gain access to the target machines. Throughout this section, we will be covering many different vulnerabilities and different targets. We perform these attacks on our virtual machines and cover another really important tool for an ethical hacker: Metasploit Framework. The goal of exploitation is to get on that target machine. This means we must drop a payload on that target machine so we can use it to navigate through their systems, look through their files, execute anything we want, and delete anything we want without the target knowing anything about it. We will also learn to create our own Viruses and Trojans that we can deliver to the target whether through an email or through an USB.

  • What is Exploitation ?

  • What is a Vulnerability ?

  • Reverse Shells, Bind Shells ..

  • Metasploit Framework Structure

  • Msfconsole Basic Commands

  • Our First Exploit - vsftp 2.3.4 Exploitation

  • Misconfigurations Happen - Bindshell Exploitation

  • Information Disclosure - Telnet Exploit

  • Software Vulnerability - Samba Exploitation

  • Attacking SSH - Bruteforce Attack

  • Exploitation Challenge - 5 Different Exploits

  • Explaining Windows 7 Setup

  • Eternal Blue Attack - Windows 7 Exploitation

  • DoublePulsar Attack - Windows Exploit

  • BlueKeep Vulnerability - Windows Exploit

  • Routersploit

  • Router Default Credentials

  • Setting Up Vulnerable Windows 10

  • Crashing Windows 10 Machine Remotely

  • Exploiting Windows 10 Machine Remotely

  • Generating Basic Payload With Msfvenom

  • Advance Msfvenom Usage

  • Generating Powershell Payload Using Veil

  • TheFatRat Payload Creation

  • Hexeditor & Antiviruses

  • Making Our Payload Open An Image



7. POST EXPLOITATION - This is what comes after Exploitation. Post exploitation is what we do on the target machine after we have exploited it. Since we are on that machine we can do many things depending on what we want to get out from it. At the end, after we do all of the things we wanted, we want to make sure we cover our tracks by deleting any event logs or deleting any evidence that we were ever on that machine.

  • Post Exploitation Theory

  • Meterpreter Basic Commands

  • Elevating Privileges With Different Modules

  • Creating Persistence On The Target System

  • Post Exploitation Modules

  • Python Coding Project - Backdoor


8. WEBSITE PENETRATION TESTING - This is another big topic for an ethical hacker. In this section, we are mainly targeting websites and their bugs/vulnerabilities. These vulnerabilities can be anything from misconfigurations, SQL Injections (us interacting with the database), Information Disclosures (having access to some information by mistake which shouldn't be out there), Command Injection (directly interacting with the system through the webpage), XSS (Cross Site Scripting Attack and Injecting Javascript code on the page).

  • Website Penetration Testing Theory

  • HTTP Request & Response

  • Information Gathering & Dirb Tool

  • Burpsuite Configuration

  • ShellShock Exploitation

  • Command Injection Exploitation

  • Getting Meterpreter Shell With Command Execution

  • Reflected XSS & Cookie Stealing

  • Stored XSS

  • HTML Injection

  • SQL Injection

  • CSRF Vulnerability

  • Hydra Bruteforce Attack 

  • Burpsuite Intruder

  • Python Coding Project - Login Brute-force + Directory Discovery


9. MAN IN THE MIDDLE - This is an attack that is used inside a network. This allows us to sniff any unencrypted data and see it in plain text. This could also include seeing passwords in plain text for some websites. There are many tools out there that can perform this attack for us and we cover some of the main ones in the section.

  • Theory - Man In The Middle Attack

  • Bettercap ARP Spoofing

  • Ettercap Password Sniffing

  • Manually Poisoning Targets ARP Cache With Scapy


10. WIFI CRACKING - This is the section where we want to gain access to a network by cracking its wireless password.

  • Wireless Cracking Theory

  • Putting Wireless Card In Monitor Mode

  • Deauthenticating Devices & Grabbing Password

  • Aircrack Password Cracking

  • Hashcat Password Cracking


11. SOCIAL ENGINEERING - This is something we cover in almost every section. Social Engineering is an attack on humans since as we know people are always the weakest security!

+ much much more!


We guarantee you this is the most comprehensive online course on hacking and security skills! Have a look at the course outline video to see all the topics we are going to cover, all the projects we’re going to build, and all the techniques you’re going to learn to become a top ethical hacker and penetration tester!


Taught By:

Andrei is the instructor of the highest rated technical courses on Udemy as well as one of the fastest growing. His graduates have moved on to work for some of the biggest tech companies around the world like Apple, Google, Tesla, Amazon, JP Morgan, IBM, UNIQLO etc... He has been working as a senior software developer in Silicon Valley and Toronto for many years, and is now taking all that he has learned, to teach programming skills and to help you discover the amazing career opportunities that being a developer allows in life.


Having been a self taught programmer, he understands that there is an overwhelming number of online courses, tutorials and books that are overly verbose and inadequate at teaching proper skills. Most people feel paralyzed and don't know where to start when learning a complex subject matter, or even worse, most people don't have $20,000 to spend on a coding bootcamp. Programming skills should be affordable and open to all. An education material should teach real life skills that are current and they should not waste a student's valuable time. Having learned important lessons from working for Fortune 500 companies, tech startups, to even founding his own business, he is now dedicating 100% of his time to teaching others valuable software development skills in order to take control of their life and work in an exciting industry with infinite possibilities.


Andrei promises you that there are no other courses out there as comprehensive and as well explained. He believes that in order to learn anything of value, you need to start with the foundation and develop the roots of the tree. Only from there will you be able to learn concepts and specific skills(leaves) that connect to the foundation. Learning becomes exponential when structured in this way.


Taking his experience in educational psychology and coding, Andrei's courses will take you on an understanding of complex subjects that you never thought would be possible.

--------

Aleksa is a Penetration Tester with over 5 years of experience in Ethical Hacking and Cyber Security. As a self made hacker that started from a young age he has learned it all from Ethical Hacking and Cyber Security to Online Privacy and How To Become Anonymous Online.


He has worked and discovered vulnerabilities for multiple companies and governments. He also worked as a freelancer that tested private web applications. He believes that Online Security and Privacy is something valuable but also that it doesn't get enough attention as many cyber attacks are being executed every single day! No System is Safe and that is why we are here to discover vulnerabilities and secure them before the bad guys attempt anything malicious!


His main goal as an instructor is to teach the foundations of Ethical Hacking and Cyber Security to anyone who wants to pursue this as a career or wants to learn it to protect themselves online. Cyber attacks and online security is something that changes really fast so we as hackers must always be ready to learn new things in order to better protect Networks, Websites, Machines .. and also people!


See you inside the courses!

Who this course is for:

  • Anybody interested in learning ethical hacking and penetration testing
  • Anybody interested in learning python and ethical hacking
  • Anybody looking to go beyond a normal "beginner" tutorial that doesn't give you a chance to practice
  • Anybody looking to learn how hackers hack computer systems
  • Any developer looking to secure their computer systems from hackers

What will i learn?

  • Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • Create trojans, viruses, keyloggers for ethical hacking
  • Learn how to crack Wireless Access Point passwords
  • Learn how to gain access to any type of machine: Windows/Linux/MacOS
  • SQL Injection, XSS, Command Injection and other techniques
  • Learn Advance Metasploit Framework usage
  • Master Information Gathering and Footprinting
  • Perform advanced scanning of an entire network
  • Learn Website Application Penetration Testing from scratch
  • Code your own Advanced Backdoor that you can use in your Penetration Tests
  • Perform newest Windows 7 + 10 exploits & attacks
  • Learn Networking & different Networking Protocols
  • Learn Python from scratch so you are able to write your own tools for ethical hacking
  • Create additional virtual *vulnerable* machines that we can practice our attacks on
  • Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning
  • Bug Bounty: Discover all types of Web Application Bugs that could cause a threat
  • Sniff passwords over the local area network with Man In The Middle Attacks
  • Learn how to trick people into opening your program (i.e Social Engineering)
  • Learn Basics of Linux and Linux Terminal
  • Learn how to perform Vulnerability Analysis
  • Perform Deauthentication Attack to disconnect everyone from the Wireless Access Point
  • Learn Advance Nmap Usage
  • Create Persistence on target machines
  • Learn how to gain access to a router in various ways
  • Combine programming knowledge and ethical hacking knowledge so you can mix techniques and adapt them to different situations
Requirements
  • No programming or hacking knowledge required. We teach you from scratch!
  • Mac / Windows / Linux - all operating systems work with this course
Curriculum for this course
262 Lessons 40:37:44 Hours
Introduction
7 Lessons 00:23:10 Hours
  • Course Outline
    Preview 00:06:37
  • Join Our Online Classroom!
    00:04:01
  • Exercise: Meet Your Classmates & Instructor
    .
  • What Is Ethical Hacking
    Preview 00:08:09
  • Course Resources + Guide
    .
  • ZTM Resources
    00:04:23
  • Bug Bounty
    .
Setting Up Our Hacking Lab
13 Lessons 01:02:32 Hours
  • What is A Virtual Machine
    Preview 00:06:03
  • Why Linux
    Preview 00:03:13
  • Monthly Coding Challenges, Free Resources and Guides
    .
  • Downloading Virtual Box & Kali Linux
    00:04:00
  • Note: Kali Linux Updates All The Time!
    .
  • Creating Our First Virtual Machine
    00:08:45
  • Installing Kali Linux Operating System
    00:11:57
  • Update 1 - New & Old Versions of Kali Linux
    00:02:21
  • Networking Basics
    .
  • Full Screen Mode & Network Settings
    00:12:05
  • Troubleshooting Network Connection in Kali Linux
    00:06:33
  • Note: Getting Familiar With Kali Linux!
    .
  • 5 Stages Of A Penetration Test
    00:07:35
Linux Operating System
5 Lessons 00:35:18 Hours
  • Navigating Through Linux System
    00:11:26
  • Creating Files & Managing Directories
    00:12:40
  • Network Commands & Sudo Privileges In Kali
    00:11:12
  • Note: Linux File System & Additional Commands
    .
  • Endorsements On LinkedIN
    .
Reconnaissance & Information Gathering
10 Lessons 01:07:57 Hours
  • What is Information Gathering ?
    00:04:40
  • Obtaining IP Address, Physical Address Using Whois Tool
    00:09:57
  • Whatweb Stealthy Scan
    00:08:21
  • Aggressive Website Technology Discovering on IP Range
    00:09:50
  • Note: Same Tools Different Results!
    .
  • Gathering Emails Using theHarvester & Hunter.io
    00:10:00
  • How To Download Tools Online
    00:10:34
  • Finding Usernames With Sherlock
    00:08:00
  • Bonus - Email Scraper Tool In Python 3
    00:06:35
  • Note: More About Information Gathering
    .
Scanning
15 Lessons 01:38:40 Hours
  • Theory Behind Scanning
    00:17:19
  • TCP & UDP
    00:04:21
  • Note: Installing Vulnerable Machine
    .
  • Installing Vulnerable Virtual Machine
    00:06:00
  • Netdiscover
    00:06:01
  • Performing First Nmap Scan
    Preview 00:08:52
  • Different Nmap Scan Types
    Preview 00:10:41
  • ZTM Nmap Cheat Sheet
    .
  • Discovering Target Operating System
    00:06:00
  • Detecting Version Of Service Running On An Open Port
    00:07:10
  • Filtering Port Range & Output Of Scan Results
    00:11:54
  • What is a Firewall IDS
    Preview 00:02:29
  • Using Decoys and Packet Fragmentation
    Preview 00:12:25
  • Security Evasion Nmap Options
    00:05:28
  • Note: Time To Switch Things Up!
    .
Python Coding Project #1 - Portscanner
4 Lessons 00:25:03 Hours
  • The 2 Paths
    .
  • Note: Do We Need To Learn Programming To Be An Ethical Hacker ?
    .
  • Python code
    .
  • Coding a Portscanner in Python 3
    00:25:03
Vulnerability Analysis
6 Lessons 00:50:38 Hours
  • Finding First Vulnerability With Nmap Scripts
    00:16:58
  • Manual Vulnerability Analysis & Searchsploit
    00:07:42
  • Nessus Installation
    00:05:35
  • Discovering Vulnerabilities With Nessus
    00:14:56
  • Scanning Windows 7 Machine With Nessus
    00:04:13
  • Lets cool down for a bit!
    00:01:14
Exploitation & Gaining Access
19 Lessons 02:45:39 Hours
  • What is Exploitation ?
    00:07:08
  • What is a Vulnerability ?
    00:05:24
  • Reverse Shells, Bind Shells
    00:02:42
  • Metasploit Framework Structure
    00:13:53
  • MSF console Basic Commands
    00:16:53
  • Our First Exploit - vsftp 2.3.4 Exploitation
    00:09:12
  • Misconfigurations Happen - Bindshell Exploitation
    00:04:41
  • Information Disclosure - Telnet Exploit
    00:04:06
  • Software Vulnerability - Samba Exploitation
    00:09:22
  • Attacking SSH - Bruteforce Attack
    00:11:56
  • Exploitation Challenge - 5 Different Exploits
    00:17:52
  • Explaining Windows 7 Setup
    00:08:56
  • Eternal Blue Attack - Windows 7 Exploitation
    00:12:33
  • DoublePulsar Attack - Windows Exploit
    00:15:04
  • BlueKeep Vulnerability - Windows Exploit
    00:09:35
  • Note: We Can Also Target Routers!
    .
  • Update 2 - Routersploit
    00:06:25
  • Update 3 - Router Default Credentials
    00:07:02
  • Exercise: Imposter Syndrome
    00:02:55
SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
4 Lessons 00:22:36 Hours
  • Note: Not Everything Will Work Smooth!
    .
  • Setting Up Vulnerable Windows 10
    00:07:52
  • Crashing Windows 10 Machine Remotely
    00:06:52
  • Exploiting Windows 10 Machine Remotely
    00:07:52
Gaining Access (Viruses, Trojans, Payloads
8 Lessons 01:06:26 Hours
  • Generating Basic Payload With Msfvenom
    00:11:30
  • Advance MSF venom Usage Part 1
    00:09:48
  • Advance Msfvenom Usage Part 2
    00:07:30
  • Generating PowerShell Payload Using Veil
    00:14:36
  • TheFatRat Payload Creation
    00:07:43
  • Note: My Payloads Are Getting Detected By An Antivirus!
    .
  • Hexeditor & Antiviruses
    00:07:09
  • Making Our Payload Open An Image
    00:08:10
Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
7 Lessons 00:52:47 Hours
  • Post Exploitation Theory
    00:02:26
  • Meterpreter Basic Commands Part 1
    00:11:03
  • Meterpreter Basic Commands Part 2
    00:10:21
  • Elevating Privileges With Different Modules
    00:08:55
  • Creating Persistence On The Target System
    00:07:57
  • Post Exploitation Modules
    00:08:05
  • Exploitation Recap
    00:04:00
Python Coding Project #2 - Backdoor
9 Lessons 01:04:02 Hours
  • What Are We Creating ?
    00:02:47
  • Connecting Server And Backdoor
    00:10:22
  • Processing Instructional Commands
    00:06:27
  • Sending and Receiving Data
    00:06:23
  • Executing Commands And Compiling The Program
    00:12:08
  • Changing Directory Inside Of Our Backdoor
    00:06:02
  • Uploading & Downloading Files
    00:10:58
  • Testing All The Commands
    00:08:55
  • Note: You Can Continue Building Onto This Project!
    .
Website Application Penetration Testing
15 Lessons 02:41:23 Hours
  • Website Penetration Testing Theory
    00:11:37
  • HTTP Request & Response
    00:04:03
  • Information Gathering & Dirb Tool
    00:08:10
  • Burpsuite Configuration
    00:07:57
  • ShellShock Exploitation
    00:15:51
  • Command Injection Exploitation
    00:11:55
  • Getting Meterpreter Shell With Command Execution
    00:09:19
  • Reflected XSS & Cookie Stealing
    00:16:16
  • Stored XSS
    00:09:06
  • HTML Injection
    00:07:12
  • SQL Injection
    00:21:31
  • CSRF Vulnerability
    00:12:50
  • Hydra Bruteforce Attack Example 1
    00:10:56
  • Hydra Bruteforce Attack Example 2
    00:07:06
  • Burpsuite Intruder
    00:07:34
Python Coding Project #3 - Login Bruteforce, Directory Discovery
7 Lessons 12:39:26 Hours
  • Creating 2 Programs
    00:01:46
  • Brute forcer In Python
    00:27:09
  • Hidden Directory Discovery
    00:12:10
  • Theory - Man In The Middle Attack
    00:08:02
  • Bettercap ARP Spoofing
    11:29:00
  • Ettercap Password Sniffing
    00:08:58
  • Manually Poisoning Targets ARP Cache With Scapy
    00:12:21
Man In The Middle - MITM
4 Lessons 00:40:51 Hours
  • Theory - Man In The Middle Attack
    00:08:03
  • Bettercap ARP Spoofing
    00:11:29
  • Ettercap Password Sniffing
    00:08:58
  • Manually Poisoning Targets ARP Cache With Scapy
    00:12:21
Extra Wireless Access Point Cracking
5 Lessons 00:38:11 Hours
  • Wireless Cracking Theory
    00:05:48
  • Putting Wireless Card In Monitor Mode
    00:03:42
  • Deauthenticating Devices & Grabbing Password
    00:11:24
  • Aircrack Password Cracking
    00:07:35
  • Hashcat Password Cracking
    00:09:42
Extra Gaining Access To An Android Device
6 Lessons 00:52:04 Hours
  • Android Hacking Theory
    00:03:31
  • Android VM Install
    00:05:50
  • Gaining Access With Android Meterpreter
    00:10:15
  • Evil Droid
    00:07:52
  • Is it Flappy Bird or Malware
    00:12:49
  • Hack Any Device On Any Network With Ngrok
    00:11:47
Extra Introduction To Anonymity
5 Lessons 00:35:14 Hours
  • Anonymity Theory
    00:04:22
  • Tor Browser
    00:08:47
  • Proxychains With Nmap
    00:07:31
  • Installing VPN in Kali Linux
    00:05:53
  • WhoAmI Anonymity Tool
    00:08:41
Extra Hacking Active Directory
3 Lessons 00:46:35 Hours
  • Enumerating Active Directory
    00:19:22
  • Exploiting Active Directory
    00:14:02
  • Escalating Privileges on the Domain
    00:13:11
Where To Go From Here
8 Lessons 00:02:34 Hours
  • Become An Alumni
    .
  • Endorsements On LinkedIN
    .
  • What is Next?
    00:02:34
  • Learning Guideline
    .
  • Practice
    .
  • Coding For Hackers
    .
  • Exploit Development
    .
  • Python Monthly
    .
Learn Python Basics
7 Lessons 00:36:35 Hours
  • What Is A Programming Language
    00:06:24
  • Python Interpreter
    00:07:04
  • How To Run Python Code
    00:04:53
  • Latest Version Of Python
    00:01:42
  • Our First Python Program
    00:07:43
  • Python 2 vs Python 3
    00:06:40
  • Exercise: How Does Python Work?
    00:02:09
Learn Python Intermediate
83 Lessons 07:46:11 Hours
  • global Keyword
    00:06:33
  • nonlocal Keyword
    00:03:20
  • nonlocal Keyword
    00:03:20
  • Why Do We Need Scope?
    00:03:38
  • Modules in Python
    00:11:47
  • Quick Note: Upcoming Videos
    .
  • Optional: PyCharm
    00:08:19
  • Packages in Python
    00:10:45
  • Different Ways To Import
    00:07:03
  • Learning Python
    00:02:05
  • Python Data Types
    00:04:45
  • How To Succeed
    .
  • Numbers
    00:11:09
  • Math Functions
    00:04:29
  • DEVELOPER FUNDAMENTALS: I
    00:04:07
  • Operator Precedence
    00:03:10
  • Exercise: Operator Precedence
    .
  • Optional: bin() and complex
    00:04:02
  • Variables
    00:13:12
  • Expressions vs Statements
    00:01:36
  • Augmented Assignment Operator
    00:02:49
  • Strings
    00:05:29
  • String Concatenation
    00:01:15
  • Type Conversion
    00:03:03
  • Escape Sequences
    00:04:23
  • Formatted Strings
    00:08:23
  • String Indexes
    00:08:56
  • Immutability
    00:03:13
  • Built-In Functions + Methods
    00:10:03
  • Booleans
    00:03:21
  • Exercise: Type Conversion
    00:08:22
  • DEVELOPER FUNDAMENTALS: II
    00:04:42
  • Exercise: Password Checker
    00:07:20
  • Lists
    00:05:01
  • List Slicing
    00:07:48
  • Matrix
    00:04:11
  • List Methods
    00:10:28
  • List Methods 2
    00:04:24
  • List Methods 3
    00:04:52
  • Common List Patterns
    00:02:40
  • List Unpacking
    00:02:40
  • None
    00:01:50
  • Dictionaries
    00:06:20
  • DEVELOPER FUNDAMENTALS: III
    00:02:40
  • Dictionary Keys
    00:06:20
  • https://drive.google.com/file/d/1xWLa2WLeehKi8b4WtlVL5iFKH1n01sA8/view?usp=drive_link
    00:04:37
  • Dictionary Methods 2
    00:07:04
  • Tuples
    00:04:46
  • Tuples 2
    00:03:14
  • Sets
    00:07:24
  • Sets 2
    00:08:45
  • Breaking The Flow
    00:02:34
  • Conditional Logic
    00:13:17
  • Indentation In Python
    00:04:38
  • Truthy vs Falsey
    00:05:17
  • Ternary Operator
    00:04:14
  • Short Circuiting
    00:04:02
  • Logical Operators
    00:06:56
  • Exercise: Logical Operators
    00:07:47
  • is vs ==
    00:07:36
  • For Loops
    00:07:01
  • Iterables
    00:06:43
  • Exercise: Tricky Counter
    00:03:23
  • range()
    00:05:38
  • enumerate()
    00:04:37
  • While Loops
    00:06:27
  • While Loops 2
    00:05:49
  • break, continue, pass
    00:04:15
  • Our First GUI
    00:08:48
  • DEVELOPER FUNDAMENTALS: IV
    00:06:34
  • Exercise: Find Duplicates
    00:08:48
  • Functions
    00:07:41
  • Parameters and Arguments
    00:04:24
  • Default Parameters and Keyword Arguments
    00:05:40
  • return
    00:13:11
  • Methods vs Functions
    00:03:44
  • Docstrings
    00:03:47
  • Clean Code
    00:04:38
  • *args and **kwargs
    00:07:56
  • Exercise: Functions
    00:04:18
  • Scope
    00:03:37
  • Scope Rules
    00:06:55
  • global Keyword
    00:06:13
Learn Python 3 Error Handling
4 Lessons 00:20:15 Hours
  • Errors in Python
    00:06:11
  • Error Handling 2
    00:06:01
  • Exercises: Error Handling
    00:04:57
  • Error Handling 3
    00:03:06
Learn Python 4 File IO
7 Lessons 00:43:37 Hours
  • Error Handling
    00:08:31
  • Working With Files In Python
    00:08:32
  • File Paths
    00:06:53
  • File IO Errors
    00:02:23
  • Read, Write, Append
    00:07:23
  • Next Steps
    .
  • Exercise: Translator
    00:09:55
BONUS SECTION
1 Lessons 00:00:00 Hours
  • Special Bonus Lecture
    .

Frequently asked question

Who this course is for:
Anybody interested in learning ethical hacking and penetration testing Anybody interested in learning python and ethical hacking Anybody looking to go beyond a normal "beginner" tutorial that doesn't give you a chance to practice Anybody looking to learn how hackers hack computer systems Any developer looking to secure their computer systems from hackers
+ View more
Other related courses
About instructor

Class Express

0 Reviews | 2 Students | 16 Courses
Teaching
Student feedback
0
0 Reviews
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Reviews

₦20000
Includes: