Loading…
View analytic
Monday, October 8 • 9:00am - Wednesday, October 10 • 5:00pm
3-day training: Python Hacker Bootcamp: Zero to Hero

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
More and more security professionals have turned to scripting languages to automate tasks and complete work faster. If you've been wanting to learn Python and couldn't figure out how to start, or tried and can't get the hang of it this course will take you from zero to hero. This course was designed to follow a hacker's methodology of programming. Instead of learning formal programming practices that you'll never use, this course focuses on core concepts taught in recipe-like modules. Throughout the course, we will reuse and build on past modules to quickly complete more complex projects. Each module has lab time for continuous hands-on opportunity and practical application exercises.

The course is taught in phases with each phase containing multiple modules and hands-on labs which build on previous modules and phases.

Phase 1: Getting up to speed
  • Introduction and Environment Setup
  • Variables and data types
  • Decisions and loops
  • Functions, error handling, and imports

Phase 2: Data parsing and I/O
  • Parsing text files, CSV and XML
  • Handling networking connections and parsing pcaps
  • Multi-Threading vs Multi-Processing with Locks, Mutexes, and Semaphores

Phase 3: Advanced data manipulation

  • Building regex
  • Scraping the web
  • Handling JSON
  • Working with APIs

Phase 4: Practical Application Projects
  • Build a Pastebin scraping bot
  • Automate malicious domain discovery from PCAPs with VirusTotal
  • Generate meaningful reports with a custom log parser
  • Create a multithreaded port scanner


WHO SHOULD TAKE THIS COURSE
Anyone that wants to take their nonexistent or basic Python skills to the next level and create complex security projects that automate large or daunting tasks.


WHAT STUDENTS SHOULD BRING
A Windows 7 or 10 laptop with full administrative rights and WiFi network connectivity for downloading third-party libraries. Sublime Text and Jupyter Notebook will be the IDE used throughout the course.


WHAT STUDENTS WILL BE PROVIDED WITH
Students will be provided with:
  • A course book containing the slides from the course
  • A lab book
  • Cheat sheets
  • Thumbdrive containing sample code and software

Speakers
avatar for JC

JC

Snowfensive
avatar for Perry Jones

Perry Jones

Reverse Engineer/Software Engineer, Snowfensive
Perry Jones is an experienced information security researcher from Montreal, Canada with more than 10 years of experience. At a young age, Perry found his passion in the field of information security, and spent his spare time studying and reverse engineering malware, researching windows... Read More →


Monday October 8, 2018 9:00am - Wednesday October 10, 2018 5:00pm
Cupertino

Attendees (17)