KEMBAR78
B74 Cyber Security Using Python 20250519 | PDF | Ip Address | Network Socket
0% found this document useful (0 votes)
17 views6 pages

B74 Cyber Security Using Python 20250519

The National Institute of Electronics & Information Technology in Gorakhpur offers a 4-week online course on Cyber Security using Python, aimed at teaching Python programming and its applications in cybersecurity. The course covers various topics including ethical hacking, network security, and real-world applications, with a focus on hands-on experience. Participants must have basic programming knowledge and a suitable computer setup, and will receive a certificate upon meeting attendance and performance criteria.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

B74 Cyber Security Using Python 20250519

The National Institute of Electronics & Information Technology in Gorakhpur offers a 4-week online course on Cyber Security using Python, aimed at teaching Python programming and its applications in cybersecurity. The course covers various topics including ethical hacking, network security, and real-world applications, with a focus on hands-on experience. Participants must have basic programming knowledge and a suitable computer setup, and will receive a certificate upon meeting attendance and performance criteria.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

National Institute of Electronics & Information Technology

Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/


Cyber Security using Python

Cyber Security using Python 4 Weeks / 60 Hrs. (3 Hrs. per day)


Batch Size: 20 (Limited Seats)
4 Weeks Online Course
Medium of Instruction: Bilingual (English & Hindi)

Objective This course is designed with the aim to gain the knowledge of Python
Programming and its applications in cyber security. Students will gain
hands-on experience in writing Python scripts to automate security
tools, conduct ethical hacking tasks, and simulate cyber defence
mechanisms.

Graduation*(in Any Stream), Diploma*, NIELIT O/ A Level* having


basic knowledge of programming (*pursuing candidate may also Eligibility
apply)

Course Fees Rs. 1800/- incl. GST & all other charges.

✓ Candidate must have latest computer/laptop with at least 4 GB RAM.


✓ Internet connection with good speed (preferably 2 Mbps or higher) Prerequisite
✓ Candidate must have basic knowledge of Programming & Networks.

Certificate will be provided to the participants, based on minimum 75%


attendance and on performance (minimum 50% marks) in the online test,
Certificate conducted by NIELIT Gorakhpur, at the end of the course.

Step-1: Read the course structure & course requirements carefully.


Step-2: Visit the Registration portal and click on apply button.
Step-3: Create your login credentials and fill up all the details, see the
preview and submit the form.
Step-4: Login with your credentials to verify the mobile number, email How to Apply?
ID and then upload the documents, Lock the profile and Pay the Fees
online, using ATM-Debit Card / Credit Card / Internet Banking / UPI etc.

Instructor Led Online Training E-Learning Contents Hands on Lab


Salient Features
Self-Assessment Real World Demo
National Institute of Electronics & Information Technology
Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/

Course Content

Day Topic Day Topic Day Topic


Cyber Security, First Python
Day Day Day
Python in Cyber Security,
#01 Importance, Common #02 #03 Script,
Threats, CIA Triad, Installing Python, VS Code Installing Cyber
Ethical Hacking, Legal Setup, Virtual Environment, Security
& Ethical Aspects Jupyter Notebook Installation Libraries with
pip
Day Variables, Data Day Day File Handling, Directory
Types, Functions, Exception Traversal, OS
#04 #05 #06
Handling, Working with
Input/Output, Commands, Log Parsing,
Conditions, Modules, math, random, sys OS Libraries
Loops
Basic Networking
Day Concepts, IP Day Networking Tools (ping, Day TCP and UDP Sockets,
#07 Addressing, #08 traceroute, etc.), Protocol #09 Server & Client Programs,
Layers (TCP/IP model), IP Scanning, Simple Chat
Subnetting & CIDR, App
Routing vs Switching, ipaddress, socket, netifaces
NAT, DHCP, DNS
Day Packet Structure & Day Hashing & Encryption (MD5, Day HTTP Basics, Sending
#10 Sniffing, Real-time #11 SHA-256, AES, RSA), Password #12 Requests, HTML Parsing,
Capture, Parsing & Security, cryptography libs Form & Login
Export, scapy tools Automation, requests,
BeautifulSoup, selenium
Dictionary Attacks,
Day WHOIS Lookups, DNS Day TCP Port Scanning, UDP Scan Day
Login Form
#13 Records, IP Geolocation, #14 Basics, Banner Grabbing, #15
Subdomain Integration with Nmap, socket, Automation, SSH/FTP
Enumeration, whois, nmap, masscan Login Scripts,
dnspython, ipwhois, paramiko, ftplib,
shodan selenium
Day Capturing Keystrokes, Day Monitoring Logs/Packets, Day Secure Coding, Malware
#16 Saving Logs, Demo & #17 Pattern Detection, Alert #18 Analysis, Input
Prevention Awareness, Mechanisms, scapy, os, re, Validation, XSS & SQLi
pynput, keyboard time Demos, flask, sqlite3

Day Social Media OSINT, Day


#19 Tweet/Reddit Data, No- #20 Final Project Implementation,
API Scraping,
Debugging, Presentation and
Sentiment & Hashtag
Demonstration
Analysis, Visualization
Tools

COURSE COORDINATOR
Abhinav Mishra
Joint Director (T)
NIELIT Gorakhpur
Email: abhinav@nielit.gov.in
Mobile Number: 8317093868
National Institute of Electronics & Information Technology
Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/

Course Details

S.No Topic to be Covered

1 Introduction to Cyber Security and Python


• What is Cyber Security
• Importance of Cyber Security in the Digital Age
• Common Threats in Cyber Security
o Malware
o Phishing
o Ransomware
o Denial-of-Service (DoS)
o Man-in-the-Middle (MitM)
• CIA Triad – Confidentiality, Integrity, Availability
• Ethical Hacking Overview
• Legal and Ethical Aspects
• Role of Python in Cyber Security
o Automation
o Scripting for Attacks and Defense
o Real-World Use Cases
o Examples of Capabilities (e.g., file handling, system interaction, network scanning)

2 Setting up Python Environment


• Installing Python (latest version recommended: Python 3.10+)
• Installing and Customizing Visual Studio Code (VS Code)
o Python Extension
o Code Runner
o Terminal access
o Folder/project management
o Git integration (for version control)
• Installing Python via Windows Store / python.org
• Creating Virtual Environment (using venv)
• Installing Jupyter Notebook (via pip)
• Writing and Running First Python Script
• Installing Key Python Libraries Using pip
• Common libraries to install for Cyber Security:
- requests – Web interaction
- beautifulsoup4 – Web scraping
- scapy – Packet manipulation/sniffing
- nmap / python-nmap – Network scanning
- paramiko – SSH automation
- pwntools – Exploit development
- dnspython – DNS queries
- flask – Web app (e.g., phishing simulation)
- mitmproxy – Interception proxy for HTTP/HTTPS
- cryptography – Hashing and encryption
- argparse – Command-line interfaces
National Institute of Electronics & Information Technology
Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/
Python Programming Essentials
3 • Variables, Data Types, Input/Output
• Conditions, Loops, Functions
• Exception Handling
• Working with Modules
• Python Libraries: math, random, sys

4 File Handling and OS Interaction


• Reading/Writing Files
• Directory Traversal
• OS-level Commands Execution
• Log File Parsing
• Python Libraries: os, shutil, pathlib, subprocess

5 Network Primer
• Basic Networking Concepts
• IP Addressing (IPv4 vs IPv6)
• Subnetting & CIDR
• Routing vs Switching
• NAT, DHCP, DNS
• Networking Tools:
- ping, traceroute, ipconfig, ifconfig, netstat, nslookup, dig
• Understanding Protocol Layers (TCP/IP model)
• Python Libraries: ipaddress, socket, subprocess, netifaces

Networking with Python


6 • Sockets (TCP, UDP)
• Server & Client Programs
• IP Scanning
Python Libraries: socket, ipaddress

Packet Sniffing & Wireshark-like Implementation


7 • Understanding Packets (Ethernet, IP, TCP/UDP, HTTP)
• Real-time Packet Capture
• Packet Parsing
• Displaying Headers like Wireshark
• Exporting to .pcap or readable formats
• Python Libraries: scapy, socket, dpkt (optional advanced parsing)

Cryptography & Hashing


8 • Hashing (MD5, SHA-256)
• Symmetric Encryption (AES)
• Asymmetric Encryption (RSA)
• Password Hashing & Salting
• Python Libraries: hashlib, cryptography, pycryptodome, bcrypt

Web Scraping & Automation


9 • HTTP Basics
• Sending Requests
• Parsing HTML
• Auto-filling Forms / Login Automation
• Python Libraries: requests, BeautifulSoup, selenium
National Institute of Electronics & Information Technology
Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/
OSINT & Reconnaissance
10 • WHOIS Lookups
• DNS Records
• IP Geolocation
• Subdomain Enumeration
• Python Libraries: whois, dnspython, ipwhois, shodan (optional)

Port Scanning & Vulnerability Detection


11 • TCP Port Scanning
• UDP Scan Basics
• Banner Grabbing
• Integration with Nmap
• Python Libraries: socket, nmap (with python-nmap), masscan (via subprocess)

Brute Force & Credential Testing


12 • Dictionary Attacks
• Login Form Automation
• SSH/FTP Login Scripts
• Python Libraries: paramiko (for SSH), ftplib, selenium

Keylogging (Awareness Only)


13 • Capturing Keystrokes
• Saving Logs
• Demo & Prevention Awareness
• Python Libraries: pynput, keyboard
Intrusion Detection Basics
14 • Monitoring Logs/Packets
• Pattern Detection (Rule-based)
• Alert Mechanisms
• Python Libraries: scapy, os, re, time

Secure Coding & Malware Awareness


15 • Secure Input Handling
• Avoiding Common Attacks
• Static Malware Analysis
• File Integrity Verification
• Python Libraries: hashlib, os, re

Web Application Security


16 • XSS and SQL Injection Demos
• Securing Forms
• Preventing Code Injection
• Python Libraries: flask (for demo apps), html (escaping), sqlite3
National Institute of Electronics & Information Technology
Gorakhpur
(Under Ministry of Electronics and Information Technology, Govt. of India)
MMMUT Campus, Deoria Road, Gorakhpur-273010
http://www.nielit.gov.in/gorakhpur/
17 Social Media Analysis for OSINT
• Social Media in Cyber Threats
• Collecting Tweets using tweepy
• Reddit Data via praw
• No-API Scraping using snscrape
• Sentiment Analysis
• Hashtag Alerting
• Visualization
• Python Libraries: tweepy, praw, snscrape, TextBlob, nltk, vaderSentiment, matplotlib,
seaborn, wordcloud

18 Project Development
• Planning & Designing
• Testing & Documentation
• Presentation Preparation
Project ideas:
• Packet Sniffer / Wireshark Clone
• Port Scanner
• Twitter T v hreat Monitor
• IDS System
• Simple Vulnerability Scanner

You might also like