[Coursera] Python For Cybersecurity Specialization - 5 Course Series

Torrent Details


[Coursera] Python for Cybersecurity Specialization - 5 course series

NAME
[Coursera] Python for Cybersecurity Specialization - 5 course series.torrent
CATEGORY
Other
INFOHASH
1c7d77a44a6fee4baceaf1bd7278a0ea9fc4dc51
SIZE
1.1 GB in 99 files
ADDED
Uploaded on 02-05-2024 by our crawler pet called "Spidey".
SWARM
35 seeders & 2 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Course link: https://www.coursera.org/programs/career-training-for-nevadans-k7yhc/specializations/pythonforcybersecurity

Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity.

Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This Specialization demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective.

Specialization - 5 course series

Introduction to Python for Cybersecurity
Course 1 • 3 hours

Execution, persistence, privilege escalation and evasion
Course 2 • 4 hours

Credential Access, discovery, lateral movement & collection
Course 3 • 4 hours

Python for Command-and-control, Exfiltration and Impact
Course 4 • 3 hours

Python for Active Defense
Course 5 • 4 hours

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Join Our Discord for More Awesome Stuff!.txt156 B
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck-command-and-control.en.txt3.1 KB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.en.txt3.6 KB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.en.txt4 KB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_06_python-for-command-and-control_quiz.html4.6 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.srt4.2 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.txt2.7 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.srt4.4 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.txt2.4 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.srt5 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.txt3.2 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.en.txt3.4 KB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_06_python-for-exfiltration_quiz.html4 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.srt4.1 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.txt2.6 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.srt5.1 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.txt2.7 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.en.txt3.6 KB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_06_python-for-impact_exam.html4.5 KB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.srt5.2 KB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.txt3.3 KB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.en.txt3.2 KB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.en.txt3.6 KB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_06_python-for-credential-access_quiz.html4.1 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.srt4.5 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.txt2.9 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.en.txt3.7 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.srt4.4 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.txt2.8 KB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_06_python-for-discovery_quiz.html4 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.srt3.5 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.txt2.2 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.srt5 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.txt2.7 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.en.txt5.3 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.en.txt4 KB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_06_python-for-lateral-movement_quiz.html4.7 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.srt3.7 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.txt2.3 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.en.txt3.9 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.en.txt3.8 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.en.txt3.6 KB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_06_python-for-collection_exam.html4.6 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.srt5.1 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.txt2.7 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.srt4.2 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.txt2.3 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.en.txt3.2 KB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_06_python-for-execution_quiz.html4.1 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.srt5 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.txt2.7 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.srt4.8 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt2.6 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.en.txt3.2 KB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_06_python-for-persistence_quiz.html4.1 KB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.srt4.8 KB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.txt2.5 KB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt3.2 KB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.en.txt4.5 KB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_06_python-for-privilege-escalation_quiz.html4.9 KB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.srt4.5 KB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.txt2.4 KB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.en.txt3.6 KB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.en.txt4.1 KB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_06_python-for-defense-evasion_exam.html4.3 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.en.txt3.5 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.en.txt3.7 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.srt5.5 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.txt3.6 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.en.txt4.1 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.en.txt4 KB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_08_decoys_quiz.html4.9 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.srt3.9 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.txt2.1 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.en.txt3 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.en.txt3.1 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.en.txt3.1 KB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_08_network_quiz.html4.2 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.srt3.3 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.txt2 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.srt5.5 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.txt2.9 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.en.txt3.7 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.en.txt4.2 KB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_08_monitoring_exam.html4.5 KB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.srt2.8 KB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.txt1.8 KB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.en.txt4.3 KB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_04_python-for-cybersecurity-resources_instructions.html1 KB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_05_python-for-cybersecurity_quiz.html3.4 KB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.en.txt3.9 KB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.en.txt3.7 KB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.en.txt3.4 KB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_07_python-for-pre-att-ck_quiz.html3.9 KB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.srt5.6 KB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.txt3 KB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.en.txt3.8 KB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.en.txt3.9 KB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_06_python-for-initial-access_exam.html4.3 KB

Alternative Torrents for 'Coursera Python for Cybersecurity Specialization course series'.

There are no alternative torrents found.