Python 101 For Hackers

Learn Python with a focus on concepts & modules important for hacking.

Training for a team or organization? Contact us about group access.

Python 101

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Beginner
  • Duration: 5h 30m
  • Access: Included in Membership

Overview

The Python 101 for Hackers course teaches an introduction to Python programming and concepts, with a focus on techniques, modules and examples which are useful for a hacker. No prior Python programming knowledge is required to be successful in this introductory course.

Students should take this Python 101 for Hackers course if they are interested in:

  • Understanding fundamental Python programming concepts, required to automate common hacking and bug bounty related tasks
  • Learning how to identify and mitigate Python programming errors which may occur when attempting to execute code snippets or proof of concept (PoC) scripts
  • Bridging the gap between generic programming concepts and practical hacking applications such as password cracking, web login brute forcing or exploitation of SQL injections

 

Objectives

Python2 vs Python3:

  • The difference between Python2 and Python3, and how to leverage both as hacking and automation tools.

Get Started with Python:

  • How to install, setup and configure a Python environment in Kali Linux with Virtual Box.

Learn Programming Basics:

  • Fundamental programming concepts: variables, data types, string formatting, booleans, operators, tuples, lists, dictionaries, sets conditionals, functions and loops.

Use Python for Ethical Hacking:

  • Python programming concepts useful for solving hacking and automation tasks: reading files, writing files, handling user input, exception and error handling, comprehensions and lambdas.
  • How to leverage and extend Python using common and hacking focused modules.
  • Practical examples demonstrating how to perform SSH login brute forcing, SHA256 password cracking, web login form brute forcing and SQL injection exploitation using Python.

Write Documentation:

  • Understanding the importance of documenting and commenting your work and recommendations to continue mastering Python and programming moving forward.

System Requirements

  • Patience and a willingness to learn
  • A computing environment (Windows, Linux, Mac) with at least 8GB of RAM and 20GB of disk space
  • Prior virtualization (Virtual Box) knowledge preferred

Recommended For

Students should take the course if they are interested in:

  • Understanding fundamental Python programming concepts, required to automate common hacking and bug bounty related tasks
  • Learning how to identify and mitigate Python programming errors that may occur when attempting to execute code snippets or proof of concept (PoC) scripts
  • Bridging the gap between generic programming concepts and practical hacking applications such as password cracking, web login brute forcing or exploitation of SQL injections

Course Curriculum

  • Introduction
    • Welcome and course introduction
    • Course Discord
    • What is Python?
    • Why learn Python as a hacker?
    • Python2 vs Python3
  • Setup
    • How to install VirtualBox
    • How to install Kali Linux
    • The Python interpreter
    • How to run a Python script
    • How to install Sublime
    • Python syntax
  • Python 101
    • Variables & data types
    • Numbers
    • String formatting
    • Booleans & operators
    • Tuples
    • Lists
    • Dictionaries
    • Sets
    • Conditionals
    • Loops
    • Reading and writing files
    • User input
    • Exceptions and error handling
    • Comprehensions
    • Functions and code reuse
    • Lambdas
  • Extending Python
    • The Python package manager
    • Python virtual environments
    • Introduction to sys
    • Introduction to requests
    • Introduction to pwntools
  • Automating with Python
    • Project #1 – SSH login brute forcing
    • Project #2 – SHA256 password cracking
    • Project #3 – Web login form brute forcing
    • Project #4 – Exploiting a SQL injection
    • Project #5 – Exploiting a restricted SQL injection
  • Closing
    • The importance of comments
    • Wrap up and next steps

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Python 101 for Hackers, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Riley Kidd Instructor

Riley Kidd

Riley has technical security consultancy experience – leading and building teams to deliver projects and outcomes for clients. He has created and facilitated technical trainings across secure coding, python for hackers, offensive operations and Capture The Flag competitions. Riley has created technical educational content across YouTube and his personal Capture The Flag platform – 247CTF.

Riley holds a number of certifications including OSCP, OSCE, OSED CEH, CISA, CISSP, CRTO, CREST CRT and CREST CCT. He has also completed a Bachelor of Software Engineering degree with honours from the Australian National University.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA