Learning Outcome:
Requirement:
Course Curriculum
Introduction to Python for ethical hacking!
Available in
days
days
after you enroll
-
Start
video1 - (Introduction - Welcome to Python For Ethical Hacking!)
(5:16)
-
Start
video2 - (Introduction - VirtualBox 6.0.4 Installation)
(11:41)
-
Start
video3 - (Introduction - Kali Linux 2019.1a Installation)
(17:07)
-
Start
video4 - (Introduction - Guest Additions Installation)
(15:08)
-
Start
video5 - (Introduction - Python In Kali Terminal)
(13:33)
Port and vulnerability scanning
Available in
days
days
after you enroll
-
Start
video6 - (Port And Vulnerability Scanning - Making Simple Portscanner)
(15:33)
-
Start
video7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner)
(9:24)
-
Start
video8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports)
(4:47)
-
Start
video9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1)
(13:13)
-
Start
video10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2)
(8:51)
-
Start
video11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner)
(9:00)
-
Start
video12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable)
(8:14)
-
Start
video13 - (Port and Vulnerability Scanning - Returning Banner From Open Port)
(14:46)
-
Start
video14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1)
(11:57)
-
Start
video15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2)
(7:21)
SSH & FTP attacks
Available in
days
days
after you enroll
-
Start
video16 - (SSH & FTP Attacks - Automating SSH Login Part 1)
(9:55)
-
Start
video17 - (SSH & FTP Attacks - Automating SSH Login Part 2)
(9:21)
-
Start
video18 - (SSH & FTP Attacks - Testing SSH Login Program)
(8:37)
-
Start
video19 - (SSH & FTP Attacks - Coding SSH Bruteforcer)
(10:38)
-
Start
video20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH)
(10:11)
-
Start
video21 - (SSH & FTP Attacks - Anonymus FTP Login Attack)
(9:55)
-
Start
video22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP)
(17:32)
Introduction to Python for ethical hacking!
Available in
days
days
after you enroll
-
Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
-
Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
-
Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
-
Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
-
Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
Port and vulnerability scanning
Available in
days
days
after you enroll
-
Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
-
Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
-
Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
-
Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
-
Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
-
Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
-
Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
-
Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
-
Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
-
Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
SSH & FTP attacks
Available in
days
days
after you enroll
-
Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
-
Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
-
Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
-
Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
-
Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
-
Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
-
Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Your Instructor
EH Academy
Reviews








Your Instructor
Course Curriculum
Introduction to Python for ethical hacking!
Available in
days
days
after you enroll
-
Startvideo1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
-
Startvideo2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
-
Startvideo3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
-
Startvideo4 - (Introduction - Guest Additions Installation) (15:08)
-
Startvideo5 - (Introduction - Python In Kali Terminal) (13:33)
Port and vulnerability scanning
Available in
days
days
after you enroll
-
Startvideo6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
-
Startvideo7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
-
Startvideo8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
-
Startvideo9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
-
Startvideo10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
-
Startvideo11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
-
Startvideo12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
-
Startvideo13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
-
Startvideo14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
-
Startvideo15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
SSH & FTP attacks
Available in
days
days
after you enroll
-
Startvideo16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
-
Startvideo17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
-
Startvideo18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
-
Startvideo19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
-
Startvideo20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
-
Startvideo21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
-
Startvideo22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Extremely interesting course
This is a very interesting course showing you Python's ability to create malware. Hussam is clearly knowledgable. I like his teaching style and the way we start off with a basic script and he covers off "upgrades" to make it harder for sec teams to spot. He also covers counter-measures and some great works from advanced persistent threat teams and the way they use social media to deliver commands to their malware. Great course. Engaging. Informative. Good quality. Interesting code. Up to date examples.
- Aimee White

I've just finished the third module, the course is awesome, hands on and will really push your skills, up to date examples and will show you a REALLY interesting hacking capabilities in Python. I really recommend this course for anyone in infosec field. - Mike J