
Mastering Cybersecurity using Python (Volume 1)
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $4.00
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Virtual Voice
-
De:
-
Abhishek Singh

Este título utiliza narración de voz virtual
Acerca de esta escucha
Structured into 11 chapters, the book progresses from fundamentals to advanced techniques, with real-world examples, legal insights, and ethical considerations.
Key Themes
Foundations of Cybersecurity
Explores core principles (CIA triad, threat modeling) and Python’s role in security automation.
Covers cybercrime classifications (phishing, ransomware) and frameworks (MITRE ATT&CK, NIST).
Offensive Security with Python
Network Scanning: Uses Scapy for packet manipulation, DNS reconnaissance, and vulnerability detection.
Web Security: Automates SQLi/XSS testing with requests and BeautifulSoup, and dynamic content analysis with Selenium.
Defensive Techniques
Cryptography: Implements AES, RSA, and hashing (SHA-256) for data protection.
Threat Mitigation: Strategies for malware, DDoS attacks, and insider threats.
Legal & Ethical Dimensions
Analyzes cyber laws (IT Act 2000, Indian Evidence Act) and admissibility of electronic evidence.
Discusses cybercrime trends (identity theft, cyberterrorism) and countermeasures.
Tools & Methods
Covers proxy servers, password cracking, keyloggers, and forensic tools with Python scripts.
Pedagogical Features
Fun Fact Corners: Engaging trivia (e.g., "The first virus, Creeper, appeared in 1971").
Real-World Code Examples: From port scanning to encrypting files.
Case Studies: Legal precedents and attack simulations (e.g., session hijacking).
Target Audience
Beginners: Clear explanations of terms like "firewall" or "hashing."
Practitioners: Ready-to-use Python scripts for penetration testing.
Legal Professionals: Primer on cyber law and digital evidence.
What Sets It Apart
Balanced Approach: Merges theory (frameworks) with practice (Python automation).
Regional Relevance: Focus on Indian cyber laws alongside global standards.
Ethical Focus: Emphasizes responsible hacking and compliance.