پیش نیازها:
- هیچ تجربه قبلی با امنیت سایبری لازم نیست
- درک اساسی در مورد چگونگی کارکرد وب مفید خواهد بود
- هیچ تجربه قبلی با برنامه نویسی لازم نیست - البته دوره پایتون در این دوره گنجانده شده است!
- این دوره برای چه کسی است؟
- مبتدیان در دنیای امنیت سایبری و / یا فناوری اطلاعات
- متخصصانی که به دنبال بهبود دانش خود در استفاده از پایتون برای امنیت سایبری هستند
- مبتدیان در امنیت برنامه های وب
- دانشجویانی که نسبت به امنیت در فناوری اطلاعات و کاربردهای عملی آن کنجکاو هستند
- دانشجویی که به دنبال یادگیری برنامه نویسی پایتون و نحوه کاربرد آن در امنیت سایبر است

در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :
Introduction
Course Work Overview
Sample Tool - Log Analyzer
Sample Tool - Text Instructions
Sample Tool - Password Checker
Sample Tool - Text Instructions
Development Environment Overview
Important course updates (don't skip)
Cyber Security
Cyber Security Introduction to Section
What is Cyber Security?
Cyber Security Introduction Quiz
Explaining the methodology
Methodology Quiz
Intro to Python and Python crash course for beginners
repl.it Introduction
Basics Review
Penetration Testing - Overview
Penetration Testing Quiz
Penetration Testing - Code Example
Penetration Testing - Text Instructions
Penetration Testing - Remediation
Port Scanning - Overview
Port Scanning Quiz
Port Scanning - Code Example
Port Scanning - Text Instructions
Port Scanning - Remediation
Botnets - Overview
Botnets - Code Example
Botnets - Code Example Continued
Botnets - Text Instructions
Botnets - Remediation
Cyber Security Topics Review
Code Exploits - Overview
Code Exploits - Code Example
Code Exploits - Text Instructions
Code Exploits - Remediation
Forensic Investigation - Overview
Forensic Investigation - Code Example
Forensic Investigation - Text Instructions
Forensic Investigation - Remediation
Network Traffic Analysis - Overview
Network Traffic Analysis - Code Example
Network Traffic Analysis - Text Instructions
Network Traffic Analysis - Remediation
Cyber Security Topics Review
Wireless - Overview
Wireless - Code Example
Wireless - Text Instructions
Wireless - Remediation
Web Reconnaissance - Overview
Web Reconnaissance - Code Example
Web Reconnaissance - Text Instructions
Web Reconnaissance - Remediation
Antivirus Evasion - Overview
Antivirus Evasion - Code Example
Antivirus Evasion - Text Instructions
Antivirus Evasion - Remediation
Social Engineering - Overview
Social Engineering - Code Example
Social Engineering - Text Instructions
Social Engineering - Remediation
Cyber Security Topics Review
Assignment - Log Analysis
Building a Security Tool
Introduction to Section - Building your own tool with Python
Installing Python Locally
Tool Development with Python - Overview
Introduction to Pip
Introduction to Pip - Text Instructions
Basic Python Script
Basic Python Script - Text Instructions
Command Line Arguments
Command Line Arguments - Text Instructions
Argument Parsing
Argument Parsing - Text Instructions
Python Tools Review
Validating Input
Validating Input - Text Instructions
Sending Requests to the Web
Sending Requests to the Web - Text Instructions
Parsing Results
Parsing Results - Text Instructions
Checking Forms
Checking Forms - Text Instructions
Python Tools Review
Generating the Report
Generating the Report - Text Instructions
Checking Comments
Checking Comments - Text Instructions
Checking Inputs
Checking Inputs - Text Instructions
Improving the Report
Improving the Report - Text Instructions
Configuration from File
Configuration from File - Text Instructions
Using Config Settings
Using Config Settings - Text Instructions
Merging the Configs
Merging the Configs - Text Instructions
Outputting the Report
Outputting the Report - Text Instructions
Python Tools Review
Pushing to GitHub
Pushing to GitHub - Text Instructions
Testing the Tool
Writing the Documentation
Distributing Your Tool
Python Tools Review
Vulnerability Report for a Website
Web Application Security
Section Introduction
Web Application Security Introduction
OWASP Overview
Introduction to the OWASP Top
OWASP and Vulnerabilities Review
Rails Overview
PHP Overview
Installing Rails and PHP
OWASP Top Vulnerabilities Example Code - Where to get it
Command Injection - Overview
Command Injection - Rails Example
Command Injection - Rails example - Text Instructions
Command Injection - PHP Example
Command Injection - PHP example - Text Instructions
SQL Injection - Overview
SQL Injection - Rails Example
SQL Injection - Rails example - Text Instructions
SQL Injection - PHP Example
SQL Injection Remediation - PHP Example
SQL Injection - PHP example - Text Instructions
Password Complexity - Overview
Password Complexity - Rails Example
Password Complexity - Rails example - Text Instructions
Password Complexity - PHP Example
Password Complexity - PHP example - Text Instructions
Information Leakage - Overview
Information Leakage - Rails Example
Information Leakage - Rails example - Text Instructions
Information Leakage - PHP Example
Information Leakage - PHP example - Text Instructions
Sensitive Data Exposure - Overview
Sensitive Data Exposure - Rails Example
Sensitive Data Exposure - Rails example - Text Instructions
Sensitive Data Exposure - PHP Example
Sensitive Data Exposure - PHP example - Text Instructions
Web Application Security Review
XML External Entities (XXE) - Overview
XML External Entities (XXE) - Rails Example
XML External Entities (XXE) - Rails example - Text Instructions
XML External Entities (XXE) - PHP Example
XML External Entities (XXE) - PHP example - Text Instructions
Broken Access Control - Overview
Broken Access Control - Rails Example
Broken Access Control - Rails example - Text Instructions
Broken Access Control - PHP Example
Broken Access Control - PHP example - Text Instructions
Security Misconfiguration - Overview
Security Misconfiguration - Rails Example
Security Misconfiguration - Rails example - Text Instructions
Security Misconfiguration - PHP Example
Security Misconfiguration - PHP example - Text Instructions
Web Application Security Review
Cross-Site Scripting (XSS) - Overview
Cross-Site Scripting (XSS) - Rails Example
Cross-Site Scripting (XSS) - Rails example - Text Instructions
Cross-Site Scripting (XSS) - PHP Example
Cross-Site Scripting (XSS) - PHP example - Text Instructions
Insecure Deserialization - Overview
Insecure Deserialization - Rails Example
Insecure Deserialization - Rails example - Text Instructions
Insecure Deserialization - PHP Example
Insecure Deserialization - PHP example - Text Instructions
Using Components with Known Vulnerabilities - Overview
Using Components with Known Vulnerabilities - Rails Example
Using Components with Known Vulnerabilities - Rails example - Text Instructions
Using Components with Known Vulnerabilities - PHP Example
Using Components with Known Vulnerabilities - PHP example - Text Instructions
Insufficient Logging and Monitoring - Overview
Insufficient Logging Monitoring - Rails example
Insufficient Logging and Monitoring - Rails Example - Text Instructions
Insufficient Logging Monitoring - PHP example - Text Instructions
Insufficient Logging and Monitoring - PHP Example - Text Instructions
Web Application Security Review
Web Security Analysis Tool
Check for Vulnerabilities in a Webapp
Topics in Cyber Security
Multi-Factor Authentication
Ethical Hacking
Password Complexity
Physical Security
Data Breaches
Cloud Security
Python Password Encryption Tool
Password Encryption Tool Introduction
Password Encryption Overview
Creating the Tool
Command Line Arguments
Adding Encryption
Check If Encryption Works
Password Encryption Tool - Source Code
Python Crash Course
Installation and expectations
Strings
Numbers
Strings and Numbers recap
Lists, Tuples, Sets
Dictionaries
Branching and Functions/Methods
Standard library and imports
Object Oriented Programming Classes
Summary
Thank You!
Appendix A Acknowledgements
Appendix B Glossary