The knowledge which you will learn from this course is literally a weapon. The goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don’t go to jail.

There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other’s tools fail, writing your own makes you a true hacker!


Key learning objective and outcomes:

      By the end of this Diploma the attendees will be able to:

  • Learn how to code your own reverse shell [TCP+HTTP]
  • Learn how to exfiltrate data from your target
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and and make an advanced shell
  • Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
  • Privilege escalation on windows with practical example



  • Python 3


Who this course is for:

  • Who this course is for:
    • Ethical hackers and penetration testers
    • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
    • Information security professionals and cyber security consultants
    • System and network security administrators
    • Programmers who want to get their hands dirty


Program Duration: 40 hours
Program Language: English / Arabic


Participants will be granted a completion certificate from Epsilon Training Institute, USA if they attend a minimum of 80 percent of the direct contact hours of the Program and after fulfilling program requirements (passing both Final Exam and Project to obtain the Certificate)


Course Outline

  •  Introduction to python
  • Python 2 vs Python 3
  • Ways to write python scripts in python Linux vs Windows
  • Basic concepts (printing, datatypes)
  • Mathematical operations
  • In-place operators
  • Executing our first script!
  • Input handling
  • Conditional statements
  • Loops
  • Functions
  • String methods
  • List methods
  • Tuple methods
  • Dictionary methods
  • Dealing with files in python
  • OOP
  • Exception handling
  • Python Decorators
  • Python Generators
  • Modules
  • OS module
  • Sys module
  • Random module
  • argparse module
  • datetime module
  • Networking knowledge and basics
  • Security knowledge and basics
  • python networking (low level networking)
  • subprocess module
  • building our first python reverse shell
  • python networking (high level URL fetching and site parsing)
  • advanced site parsing
  • creating directory brute forcer
  • building our login Dictionary attack script
  • attacking basic authentication
  • building subdomain takeover vulnerability scanner
  • building HTTP backdoor (optional based on students)
  • encryption vs hashing vs encoding vs obfuscation
  • python hashing library
  • building our first MD5 cracker
  • Solving python CTF’s
  • regular expressions
  • dealing with JSON in python
  • dealing with web API’s in python
  • introduction to third party modules
  • PIP3 vs PIP2
  • dealing with encryption in python
  • Encryption Evolution
  • creating simple XOR encryption
  • Symmetric encryption concepts
  • Advanced Encryption Standard (AES)
  • Symmetric encryption Attacks
  • Symmetric encryption attacks protection
  • Building AES-256 CTR message encryption/decryption script
  • Building AES-256 CBC message encryption/decryption script
  • Building AES-256 encrypted channel reverse shell (optional based on students)
  • Building simple ransomware based on AES-256 encryption (optional based on students)
  • Dealing with NMAP
  • Python colors
  • Dealing with wireless in python


Course Curriculum

No curriculum found !

Drop Us A Query

Drop us a Query

    Top Rated Course

    Copyright © 2018 Epsilon Registered in Egypt with company no. 118268