This course is part of Python for Cybersecurity.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Python for Cybersecurity Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.5
(74 ratings)
6,409 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 2 more
What you'll learn
Implement Python scripts for code execution and scheduled tasks
Develop persistence mechanisms using registry and execution flow hijacking
Create privilege escalation techniques with Python
Build defense evasion methods including AV impairment and artifact hiding
Skills you'll gain
This course includes:
2.4 Hours PreRecorded video
4 quizzes
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This course focuses on advanced Python programming techniques for cybersecurity operations, specifically covering four key areas of the MITRE ATT&CK framework: execution, persistence, privilege escalation, and defense evasion. Students learn to understand and implement various attack techniques including scheduled tasks, registry manipulation, process injection, and defense impairment, while gaining practical experience with Python scripting for security operations.
Python for execution
Module 1 · 1 Hours to complete
Python for persistence
Module 2 · 1 Hours to complete
Python for privilege escalation
Module 3 · 1 Hours to complete
Python for defense evasion
Module 4 · 1 Hours to complete
Fee Structure
Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Python for Cybersecurity
Instructor
Howard Poston: Versatile Cyber and Blockchain Researcher and Consultant
Howard Poston is a freelance cyber and blockchain researcher, trainer, consultant, and software developer with extensive experience in developing high-quality educational content. He provides security assessments, conducts research, and engages in code development for both academic and industry projects. Specializing in cryptography, blockchain, malware analysis, and cybersecurity, Howard holds a
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.