CyberProtex
  • Home
  • SERVICES
    • Security and Compliance >
      • Cybersecurity Services >
        • Assessment and Testing
        • Managed Security Support >
          • Identity and Access Management
          • Continuous Monitoring
          • Endpoint Protection
          • Incident Response
          • Security Awareness Training Services
      • Compliance Services >
        • CMMC Certified Services >
          • CMMC - Provisional Assessors (PA)
          • CMMC - Registered Practitioners (RP)
        • RMF and eMASS Compliance
        • DFARS Compliance
  • SOFTWARE
    • Software Engineering
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • CyberLMS Software >
        • Test Prep App - CyberLMS Software
        • Cyber Range Software - On Demand - Azure Labs
        • Security Awareness Training Software
        • Hackme - Software
  • Training
    • Certification Courses >
      • CISSP
      • Security+
      • One-day Security+
      • Linux+
      • Kali Linux Pro
      • Mobile Forensics Professional
      • Red Hat - SA
      • CEH
      • CASP+
      • CHFI
      • CISM
      • CAP
      • CCNA
      • CND
      • ISSEP
      • MTA
      • Network+
    • Schedule >
      • Cyber Workshops >
        • Cyber Resiliency TTX
        • eMASS
        • FEMA Cyber Resiliency TTX
      • Lunch and Learn Schedule
      • YouTube Channel
      • Summer Camps
      • DHS-Training
    • Online Courses >
      • CyberLMS - eLearning
      • eLearning >
        • Creative Content
        • Video Training
        • Cybersecurity Tools
  • Meet the Team
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
  • Shop
  • Product
  • Software Assurance

Advanced Python
​


​For our Advanced Python course we follow the "Violent Python" book by TJ O'Connor. We shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
​

- Data-mine popular social media websites and evade modern anti-virus.

Picture
CyberProtex, LLC - 2012-2020
ContactUs@CyberProtex.com
256-401-7072
Picture
  • Home
  • SERVICES
    • Security and Compliance >
      • Cybersecurity Services >
        • Assessment and Testing
        • Managed Security Support >
          • Identity and Access Management
          • Continuous Monitoring
          • Endpoint Protection
          • Incident Response
          • Security Awareness Training Services
      • Compliance Services >
        • CMMC Certified Services >
          • CMMC - Provisional Assessors (PA)
          • CMMC - Registered Practitioners (RP)
        • RMF and eMASS Compliance
        • DFARS Compliance
  • SOFTWARE
    • Software Engineering
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • CyberLMS Software >
        • Test Prep App - CyberLMS Software
        • Cyber Range Software - On Demand - Azure Labs
        • Security Awareness Training Software
        • Hackme - Software
  • Training
    • Certification Courses >
      • CISSP
      • Security+
      • One-day Security+
      • Linux+
      • Kali Linux Pro
      • Mobile Forensics Professional
      • Red Hat - SA
      • CEH
      • CASP+
      • CHFI
      • CISM
      • CAP
      • CCNA
      • CND
      • ISSEP
      • MTA
      • Network+
    • Schedule >
      • Cyber Workshops >
        • Cyber Resiliency TTX
        • eMASS
        • FEMA Cyber Resiliency TTX
      • Lunch and Learn Schedule
      • YouTube Channel
      • Summer Camps
      • DHS-Training
    • Online Courses >
      • CyberLMS - eLearning
      • eLearning >
        • Creative Content
        • Video Training
        • Cybersecurity Tools
  • Meet the Team
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
  • Shop
  • Product
  • Software Assurance