Unlock the power of Python for cybersecurity tasks with our hands-on course tailored for security professionals seeking to enhance their scripting skills for log manipulation, forensics, and more.
EnrollCreate working Python scripts following best practices
Perform log file analysis using Python
Use Python for security filters and packet analysis
Write secure Python applications with robust exception handling
Geared for experienced security professionals new to Python, Python Programming for Security Analysts & Professionals is practical, hands-on Python training course that leads the student from the basics of writing and running Python scripts to more advanced features such as file operations, regular expressions, working with binary data, and using the extensive functionality of Python modules. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. This course is tailored specifically for Security Analysts and others who wish to use Python functionality for security-related tasks such as log manipulation or forensics. This course is essential for security professionals that are performing security reviews and audits of Python applications or are supporting development teams in implementing better defenses in Python.
What is python?
Python Timeline
Advantages/Disadvantages of Python
Getting help with pydoc
Starting Python
Using the interpreter
Running a Python script
Python scripts on Unix/Windows
Editors and IDEs
Using variables
Builtin functions
Strings
Numbers
Converting among types
Writing to the screen
Command line parameters
About flow control
White space
Conditional expressions
Relational and Boolean operators
While loops
Alternate loop exits
About sequences
Lists and list methods
Tuples
Indexing and slicing
Iterating through a sequence
Sequence functions, keywords, and operators
List comprehensions
Generator Expressions
Nested sequences
File overview
Opening a text file
Reading a text file
Writing to a text file
Reading and writing raw (binary) data
Converting binary data with struct
About dictionaries
Creating dictionaries
Iterating through a dictionary
About sets
Creating sets
Working with sets
Defining functions
Parameters
Global and local scope
Nested functions
Returning values
The sorted() function
Alternate keys
Lambda functions
Sorting collections
Syntax errors
Exceptions
Using try/catch/else/finally
Handling multiple exceptions
Ignoring exceptions
The import statement
Module search path
Creating modules and Using packages
Function and Module aliases
About o-o programming
Defining classes
Constructors
Methods
Instance data
Properties
Class methods and data
RE syntax overview
RE Objects
Searching and matching
Compilation flags
Groups and special groups
Replacing text
Splitting strings
The sys module
Launching external programs
The string module
Reading CSV data
Working with dates and times
Translating timestamps
Parsing dates from text
Paths, directories, and filenames
Checking for existence
Permissions and other file attributes
Walking directory trees
Creating filters with fileinput
Security and File Access
Grabbing web content
Detecting Malformed Input
Parsing command-line options
Getting help with pydoc
Safely handling untrusted data
Managing eval() permissions
Potential insecure packages
Embedding code snippets in Python
Embedding authentication data in Python
Potentially dangerous operations:
File access
Operating system access
Calls to external services
Called to external data sources
Static analysis tools such as Bandit
Raw log file manipulation
Fail2Ban
Customizing Fail2Ban with Python
SQL-Injection Detection
ModSecurity CRS filtering
Packet Sniffing in Python
Security Logging and Analytics
Attack Detection and Defense
Python and Spark High-Level Overview
What is Flask?
Developing a Flask Web service
Mapping resources using URLs
Mapping resources using HTTP
Negotiating data content
OWASP 2021 Top Ten Overview
Python Code Access Control
Options for Protecting Data
Injection and Python
Python and Data Validation
Python and XML Processing
Python and Known Vulnerable Components
Python and Serialization/Deserialization
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier