All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
$29
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
$29
  • Ethical hacking
  • Python programming
  • Network security
  • Linux systems
  • Kali Linux

If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:

  • Introduction and setup

  • Port and vulnerability scanning

  • SSH and FTP attacks

  • Password cracking

  • Sniffers, flooders and spoofers

  • DNS spoofing

  • Network analysis

  • Coding a multi-functioning reverse shell

  • Keyloggers

  • Command and control center

  • Website penetration testing

This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.

Still not sold? Check out these great reviews!

"It's already fun wow. I enjoy learning ethical hacking and python"

"Great even for non-programmers!"

"Great Course"

Thank you for taking the time to read this and we hope to see you in the course!

  • A personal computer.
  • An internet connection to download the necessary software.
  • Students who would like to learn Python programming.
  • Students interested in ethical hacking.
View More...
  • Section 1 : Introduction and Setup 5 Lectures 01:02:36

    • Lecture 1 :
    • Welcome to Python for ethical hacking! Preview
    • Lecture 2 :
    • VirtualBox installation
    • Lecture 3 :
    • Kali Linux installation
    • Lecture 4 :
    • Adding Guest Additions
    • Lecture 5 :
    • Python in the Linux terminal
  • Section 2 : Port and Vulnerability Scanning 10 Lectures 01:42:44

    • Lecture 1 :
    • Coding a simple port scanner
    • Lecture 2 :
    • Adding raw_input to our port scanner
    • Lecture 3 :
    • Scanning the first 1,000 ports
    • Lecture 4 :
    • Coding an advanced port scanner part 1
    • Lecture 5 :
    • Coding an advanced port scanner part 2
    • Lecture 6 :
    • Finishing and testing our scanner
    • Lecture 7 :
    • Configuring IP address and installing Metasploitable
    • Lecture 8 :
    • Returning banner from open port
    • Lecture 9 :
    • Coding a vulnerability scanner part 1
    • Lecture 10 :
    • Coding a vulnerability scanner part 2
  • Section 3 : SSH and FTP Attacks 7 Lectures 01:15:59

    • Lecture 1 :
    • Automating SSH login part 1
    • Lecture 2 :
    • Automating SSH login part 2
    • Lecture 3 :
    • Testing our SSH login program
    • Lecture 4 :
    • Coding a SSH brute-forcer
    • Lecture 5 :
    • Executing commands on target after brute-forcing SSH
    • Lecture 6 :
    • Anonymous FTP login attack
    • Lecture 7 :
    • Username & password list attack on FTP
  • Section 4 : Password Cracking 4 Lectures 01:02:40

    • Lecture 1 :
    • SHA256, SHA512 and MD5
    • Lecture 2 :
    • Cracking SHA1 hash with online dictionary
    • Lecture 3 :
    • Getting password from MD5 hash
    • Lecture 4 :
    • Cracking crypt passwords with salt
  • Section 5 : Sniffers, Flooders and Spoofers 12 Lectures 02:33:33

    • Lecture 1 :
    • Changing MAC address manually
    • Lecture 2 :
    • Coding MAC address changer
    • Lecture 3 :
    • Theory behind ARP spoofing
    • Lecture 4 :
    • Crafting malicious ARP packet
    • Lecture 5 :
    • Coding ARP spoofer
    • Lecture 6 :
    • Forwarding packets and restoring ARP tables
    • Lecture 7 :
    • Spoofing our IP address and sending message with TCP payload
    • Lecture 8 :
    • Running SynFlooder with changed source IP address
    • Lecture 9 :
    • Getting source and destination MAC address from received packets
    • Lecture 10 :
    • Sniffing FTP username and password part 1
    • Lecture 11 :
    • Sniffing FTP username and password part 2
    • Lecture 12 :
    • Getting passwords from HTTP websites
  • Section 6 : Coding DNS Spoofer 4 Lectures 00:47:52

    • Lecture 1 :
    • Cloning any webpage
    • Lecture 2 :
    • Printing DNS queries
    • Lecture 3 :
    • Redirecting response to cloned page
    • Lecture 4 :
    • Setting IP table rules and running DNS spoofer
  • Section 7 : Network Analysis 5 Lectures 01:20:38

    • Lecture 1 :
    • Analyzing Ethernet header
    • Lecture 2 :
    • Analyzing IP header part 1
    • Lecture 3 :
    • Analyzing IP header part 2
    • Lecture 4 :
    • Analyzing TCP header
    • Lecture 5 :
    • Analyzing UDP header
  • Section 8 : Multi-functioning Reverse Shell 17 Lectures 03:14:13

    • Lecture 1 :
    • Theory behind socket programming
    • Lecture 2 :
    • Wine and Pyinstaller installation
    • Lecture 3 :
    • Setting up listener
    • Lecture 4 :
    • Establishing connection between target and server
    • Lecture 5 :
    • Implementing send & receive functions
    • Lecture 6 :
    • Executing commands on target system
    • Lecture 7 :
    • Importing JSON library to parse data
    • Lecture 8 :
    • Converting Python backdoor to .exe
    • Lecture 9 :
    • Using OS library to change directory
    • Lecture 10 :
    • Downloading & uploading files to target PC
    • Lecture 11 :
    • Hiding our backdoor and creating persistence
    • Lecture 12 :
    • Trying to connect to server every 20 seconds
    • Lecture 13 :
    • Downloading files to target PC
    • Lecture 14 :
    • Capturing screenshot on target PC
    • Lecture 15 :
    • Administrator privilege check
    • Lecture 16 :
    • Starting other programs with our shell
    • Lecture 17 :
    • Running our shell as an image, audio, PDF
  • Section 9 : Coding a Keylogger 4 Lectures 00:38:01

    • Lecture 1 :
    • Installing Pynput
    • Lecture 2 :
    • Printing space character
    • Lecture 3 :
    • Calling timer on our keylogger
    • Lecture 4 :
    • Adding keylogger to our backdoor
  • Section 10 : Command and Control Center 7 Lectures 01:17:25

    • Lecture 1 :
    • What is a threaded server?
    • Lecture 2 :
    • Accepting connections with a thread
    • Lecture 3 :
    • Managing multiple sessions
    • Lecture 4 :
    • Testing threaded server with Windows 10 target
    • Lecture 5 :
    • Fixing Q command
    • Lecture 6 :
    • Coding exit function
    • Lecture 7 :
    • Attacking multiple targets and gathering botnet
  • Section 11 : Website Penetration Testing 14 Lectures 02:25:23

    • Lecture 1 :
    • Stealing saved wireless passwords
    • Lecture 2 :
    • Saving passwords to a file
    • Lecture 3 :
    • Bruteforcing Gmail
    • Lecture 4 :
    • Bruteforcing any login page part 1
    • Lecture 5 :
    • Bruteforcing any login page part 2
    • Lecture 6 :
    • Finding hidden directories part 1
    • Lecture 7 :
    • Finding hidden directories part 2
    • Lecture 8 :
    • Discovering subdomains
    • Lecture 9 :
    • Changing HTTP headers
    • Lecture 10 :
    • Starting basic and digest authentication bruteforcer
    • Lecture 11 :
    • Controlling threads
    • Lecture 12 :
    • Coding run function
    • Lecture 13 :
    • Printing usage and testing our program
    • Lecture 14 :
    • Taking a look at ransomware
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Joseph Delgadillo,

Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 1 million students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more. He graduated with honors from Central Washington University.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.