Python Scapy for Network Security

Python Scapy for Network Security

This course teaches you how to use Python Scapy for network security tasks, including port scanning, vulnerability detection, and building honeypots.

Intermediate

37 Lessons

3h

Certificate of Completion

This course teaches you how to use Python Scapy for network security tasks, including port scanning, vulnerability detection, and building honeypots.

AI-POWERED

Explanations

AI-POWERED

Explanations

This course includes

1 Project
68 Playgrounds

This course includes

1 Project
68 Playgrounds

Course Overview

Scapy is a powerful Python library used for network packet manipulation and analysis. It allows users to create, manipulate, send, and capture network packets. Scapy is particularly useful for network security professionals, developers, and researchers who need to interact with and analyze network traffic. Python Scapy empowers you to automate various cybersecurity tasks, both offensive and defensive. This course will teach you how to use Python and Scapy to build a port, honeypot, and custom vulnerability...Show More

What You'll Learn

An understanding of how to utilize Scapy for Network Packet Analysis

Working knowledge of how to create a functional port scanner using Python Scapy

Hands-on experience utilizing tools and databases like the National Vulnerability Database (NVD) for vulnerability research

The ability to monitor and filter network traffic, craft valid packet responses, and implement a functional DNS honeypot server using Scapy

Hands-on experience applying Scapy and Python scripting to automate both offensive and defensive cybersecurity tasks, including port scanning, vulnerability detection, and server emulation

What You'll Learn

An understanding of how to utilize Scapy for Network Packet Analysis

Show more

Course Content

1.

Introduction to Scapy

This chapter sets the stage for your journey into network security with Python.
2.

Port Scanning with Scapy

This chapter covers port scanning with Scapy, building SYN scanners, exploring TCP/IP headers, and analyzing responses to identify open/closed ports.
3.

Developing Custom Vulnerability Scans

This chapter covers developing custom vulnerability scans, including using automated tools, banner grabbing, NVD searches, and credential-stuffing techniques.
4.

Creating Servers and Honeypots

This chapter covers creating custom vulnerability scans using automated tools, banner grabbing, NVD searches, and implementing credential stuffing.

Develop a Honeypot Authentication Server

Project

5.

Conclusion

This chapter summarizes key techniques in network traffic analysis, vulnerability scanning, and honeypot creation using Scapy.

Course Author

Trusted by 1.4 million developers working at companies

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Evan Dunbar

ML Engineer

Carlos Matias La Borde

Software Developer

Souvik Kundu

Front-end Developer

Vinay Krishnaiah

Software Developer

Eric Downs

Musician/Entrepeneur

Kenan Eyvazov

DevOps Engineer

Souvik Kundu

Front-end Developer

Eric Downs

Musician/Entrepeneur

Anthony Walker

@_webarchitect_

Emma Bostian 🐞

@EmmaBostian

Hands-on Learning Powered by AI

See how Educative uses AI to make your learning more immersive than ever before.

Instant Code Feedback

Evaluate and debug your code with the click of a button. Get real-time feedback on test cases, including time and space complexity of your solutions.

AI-Powered Mock Interviews

Adaptive Learning

Explain with AI

AI Code Mentor

FOR TEAMS

Interested in this course for your business or team?

Unlock this course (and 1,000+ more) for your entire org with DevPath