Advertisement

Building Malicious Programs with Python | Level 2 Python for Cybersecurity

Building Malicious Programs with Python | Level 2 Python for Cybersecurity It's finally back! The Complete Python Project for Cybersecurity Level Two is finished. To skip the small intro of why I missed the uploads for this project, please go to 1:00. The following list below covers the overall summary of this video.

Important Timestamps
1:00 - The video is started with me explaining how it's overwhelming to start a course from 0% sometimes
1:25 - I explain the details of this project
2:24 - Timelapse of me starting the project
2:49 - I talk about bypassing HTTPS
4:01 - Explaining how the basic keylogger program works - a program we write in this course
5:48 - Wrapping the course with my overall thoughts
7:18 - Explain a basic Trojan program covered within the course

The Complete Python for Hacking and Cyber Security Bundle:


Zaid's website:


Personal Notes this Level:

Link to Github profile with Python Programs: Coming Soon

For more information and extra help, visit:

Join the Email List for More Information and Exclusive Updates!

Sign up:

Follow Me:
Twitter:
Instagram:

Join the Discord Server:


Have questions, concerns, comments?:
Email me: grant@cyberinternacademy.com

Gear:
Laptop (Lenovo X1 Carbon Ultrabook):
Monitors (Dell D Series 31.5” D3218HN):
Keyboard (Velocifire VM01):
Headphones (Audio Technica ATH-M40x):

Songs:
JHC BEATS - MALIANTEO TYPE BEAT No Copyright Trap
Lofi Hip Hop Music (No Copyright)
DAYZVIBES - 'MERCURY' HARD TYPE BEAT_ No Copyright

Cybersecurity,Cyber Security,cybersecurity,cyber security,python,python for cyber security,python for security,The Complete Python for Hacking and Cyber Security,how to get started in cybersecurity,python for cybersecurity,ZAID AL QURAISHI,Python,Writing Python Programs for Cybersecurity,stationx,cybersecurity student,

Post a Comment

0 Comments