Advanced Search
Search Results
843 total results found
Terms and definitions from Course 6, course 6 glossary
A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized access to a system for an extended period of time Analysis: The investigation and validation of alerts Anomaly-based analysis: A detection method that identifies...
PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)
| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the...
Python Wrangling
files you will need ende.py import sys import base64 from cryptography.fernet import Fernet usage_msg = "Usage: "+ sys.argv[0] +" (-e/-d) [file]" help_msg = usage_msg + "\n" +\ "Examples:\n" +\ " To decrypt a file named 'pole...
New Page
script to solve it encoded_str = "灩捯䍔䙻ㄶ形楴獟楮獴㌴摟潦弸彥㜰㍢㐸㙽" decoded_str = "" for char in encoded_str: ascii_val = ord(char) first_char = chr(ascii_val >> 8) second_char = chr(ascii_val % 256) decoded_str += first_char + second_char pri...
New Page
Crouse Outline ?
You will get an introduction to the Python programming language and how Python is used in cybersecurity. You'll also explore foundational Python concepts including data types, variables, conditional statements, and iterative statements.Learning Objectives ...
Introduction to Course 7
The demand for security professionals has never been higher.Organizations across the world require professionals with your knowledge and skills to protect their systems from attackers.And with the number of threats on the rise, security professionals often per...
Ángel: My personal career journey
My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life that led me to security.One of them was definitely curiosity when I was growing up.My parents are accountants, and so they had pocket calculators and mechanical pe...
Welcome to module 1
The process of learning a new programming language is similar to learning a new language.For instance, like any human language, programming consists of words organized together to form lines of code.Lines of code are used to communicate with a computer, simila...
Python and cybersecurity
Security professionals use a variety of tools.One of those tools is computer programming.Programming is used to create a specific set of instructions for a computer to execute tasks.Let's take an example of a vending machine.Think of a vending machine as a com...
Get to know Python!
Why might a security analyst choose Python to automate tasks? Python resembles human language and is easy to read. A security analyst might choose Python to automate tasks because they can find a lot of support online and follow standard guidelines. An an...
Create a basic Python script
Hi there.Previously, we discussed the basics of Python.Now we'll practice writing and running code.When we work in Python, we refer to what we write as a "script" or a "program." There are subtle differences between the two.Let's compare a computer program to ...
Python environments
You can run Python through a variety of environments. These environments include notebooks, integrated development environments (IDEs), and the command line. This reading will introduce you to these environments. It will focus primarily on notebooks because th...
copy paste this into a .html this is what the lab looks like
<!DOCTYPE html> <html> <head><meta charset="utf-8" /> <title>LAB_Activity_PracticeWritingPythonCode-Copy1</title> <script src="https://cdnjs.cloudflare.com/ajax/libs/require.js/2.1.10/require.min.js"></script> <script src="https://cdnjs.cloudflare.com...
Akash: Python and the cybersecurity professional
My name is Akash, and I work as a Security Engineer at Google.As a cybersecurity engineer, you would end up using Python for most of your career.It's very important that you learn Python.When you are moving into cybersecurity, you would be dealing with million...
Data types in Python
Our next topic relates to categorizing data in Python.First, let's take a moment to consider another environment where we apply categories.We'll think about working in the kitchen.When cooking, we can categorize the ingredients we use; for example, carrots and...
More about data types
Previously, you explored data types in Python. A data type is a category for a particular type of data item. You focused on string, list, float, integer, and Boolean data. These are the data types you'll work with in this course. This reading will expand on th...
Work with variables in Python
Previously, we compared data types to the categories we have for different ingredients we use when cooking, like vegetables or meat.Some of these categories we use for data types are the string, float, integer, Boolean, and list.Now, let's make another compari...
Assign and reassign variables in Python
Previously, you've explored variables and how to assign and reassign them in Python. In this reading, you'll expand your understanding of these topics. You’ll also learn about the general practice of naming variables so that you can avoid syntax errors and imp...
Conditional statements in Python
Previously, we discussed how to store different data types in variables.Now we'll begin to move into the concept of automation, so we can create exciting actions with code.Automation is the use of technology to reduce human and manual effort to perform common ...