Applying Python in cybersecurity
Type: For the student's choice
Department: cybersecurity
Curriculum
Semester | Credits | Reporting |
6 | 4 | Setoff |
Lectures
Semester | Amount of hours | Lecturer | Group(s) |
6 | 16 | H. A. Kvasnytsia | PMk-31 |
Laboratory works
Semester | Amount of hours | Group | Teacher(s) |
6 | 32 | PMk-31 | H. A. Kvasnytsia |
Course description
The course involves an in-depth study of the Python programming language tools that can be used both to conduct cyberattacks and to neutralize and effectively counter them.
The aim of the course is to provide students with theoretical knowledge and practical skills to apply Python in developing their own and modifying existing tools in the field of cybersecurity.
Recommended Literature
- Ortega J.M. Python for Security and Networking: Leverage Python modules and tools in securing your network and applications – Packt Publishing, 2023, 586 p
- Chou E. Mastering Python Networking. – Packt Publishing, 2023, 576 p.
- Gracam D.G. Ethical Hacking: A Hands-on Introduction to Breaking In – No Starch Press, 2021, 376 p.
- Duffy C. Python: Penetration Testing for Developers – Packt Publishing, 2016. -666 p.
- Seitz J., Arnold T. Black Hat Python: Python Programming for Hackers and Pentesters – No Starch Press, 2021, 216 p.
- Lutz M/ Learning Python – O’Reilly Media, 2013. 1643 p.
- Rehim R. Effective Python Penetration Testing – Packt Publishing, 2016, 164 p.
- Buchanan C. Python Web Penetration Testing Cookbook – Packt Publishing Ltd, 2015. – 224 p.
- O’Connor TJ. Violent Python. A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Elsevier, 2013. – 269 p.