PROGRAMMING

This section is intended to provide an introduction to networking commands, which can be used to set up a firewall and display general information about a network. Such as checking the connectivity to hosts, mapping devices and configuring the interfaces used by these devices to connect to the network.

B A S H

Learning Bash Scripting

01 - What is Bash?
02 - Pipes and redirection
03 - Bash builtins and other commands
04 - Brackets and braces in bash
05 - Bash expansions and substitutions
06 - Brace expansion
07 - Parameter expansion
08 - Command Substitution
09 - Arithmetic expansion
10 - Choosing a text editor for bash
11 - Understanding Bash Script Syntax
12 - Displaying Text With Echo
13 - Working With Variables
14 - Working With Numbers
15 - Comparing Values With Text
16 - Comparing Values With Extended Text
17 - Formatting And Styling Text Output
18 - Formatting Output With printf
19 - Working With Arrays
20 - Challenge Make A Script That Generates A System Report
21 - Solution Make A Script That Generates A System Report
22 - Conditional Statements With if
23 - Working With While And Until Loops
24 - Introducing for Loops
25 - Selecting Behavior Using Case
26 - Using Functions
27 - Reading And Writing Text files
28 - Challenge Build A Script Using Control Structures
29 - Solution Build A Script Using Control Structures
30 - Working With Arguments
31 - Working With Options
32 - Getting Input During Execution
33 - Ensuring A Response
34 - Challenge Use A Script That Uses Input
35 - Solution Make A Script That Uses Input
36 - Troubleshooting
37 - Ensuring Script Portability

JAVASCRIPT

Ethical hacking with JavaScript

01 - What is ethical hacking?
02 - Overview of the cyber kill chain
03 - Plan an attack strategy
04 - Base project setup
05 - Reconnaissance introduction
06 - Introduction and setup for Snyk
07 - Introduction and setup for Retire.js
08 - Introduction to AppSensor
09 - Review of the plan
10 - Injection threat
11 - Broken Authentication
12 - Sensitive Data
13 - XML External Entities
14 - Security Misconfiguration
15 - Insecure Deserialization
16 - Components With Known Vulnerabilities
17 - Insufficient Logging And Monitoring

PYTHON

Python starter course

01 - Install and setup Mac/Windows
02 - Working with textual data
03 - Working with numerical data
04 - Lists, tuples and sets
05 - Dictionaries
06 - Conditionals and booleans
07 - Loops and iterations
08 - Functions
09 - Modules and the standard library

THEORY

Lectures about coding

01 - How to think like a programmer
02 - The art of code (Dylan Beattie)