All language subtitles for 3. Introduction to Python Programming & Ethical Hacking

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,000 --> 00:00:05,190 Now as I promised you this course is going to be highly practical. 2 00:00:05,320 --> 00:00:09,030 But I also promise that I will not neglect this hearing. 3 00:00:09,430 --> 00:00:15,320 So I want to cover some terminology before we jump into hocking programming. 4 00:00:15,970 --> 00:00:22,870 Now what we mean by hocking is being able to gain access to a system that you're not supposed to have 5 00:00:22,870 --> 00:00:24,220 access to. 6 00:00:24,220 --> 00:00:30,520 So for example logging into an email account that you're not supposed to have access to is considered 7 00:00:30,520 --> 00:00:32,550 hocking that account. 8 00:00:32,920 --> 00:00:39,100 Gaining access to a remote computer that you're not supposed to have access to is hacking that computer 9 00:00:39,520 --> 00:00:43,510 reading information that you're not supposed to be able to read. 10 00:00:43,540 --> 00:00:45,820 Again it's considered hacking. 11 00:00:46,390 --> 00:00:52,690 So you can see that there is a large number of ways to hack into a system and the word hacking can refer 12 00:00:52,690 --> 00:00:59,980 to a number of things but the main concept is the same gaining access or being able to do things that 13 00:00:59,980 --> 00:01:04,590 you're not supposed to be able to do is considered hacking. 14 00:01:04,600 --> 00:01:07,060 Now there are three main types of hackers. 15 00:01:07,120 --> 00:01:08,830 We have the black hat hackers. 16 00:01:08,860 --> 00:01:15,820 These are the bad people that hack systems illegally in order to steal money or to achieve their own 17 00:01:15,950 --> 00:01:18,040 illegal goals. 18 00:01:18,040 --> 00:01:21,330 The second part of hackers are the white hat hackers. 19 00:01:21,340 --> 00:01:22,910 So this is us. 20 00:01:23,080 --> 00:01:30,550 These people use the same techniques used by black hat hackers and they also hack into systems but they 21 00:01:30,550 --> 00:01:38,830 only hack into systems that they have permission to hack in order to test the security of these systems. 22 00:01:38,860 --> 00:01:42,300 And finally we have the Greatheart hackers. 23 00:01:42,340 --> 00:01:44,530 These are a mixture of the two. 24 00:01:44,560 --> 00:01:50,570 So they will hack into any system even if they don't have permission to test the security of the system. 25 00:01:50,830 --> 00:01:54,430 But they will never steal money or damage that system. 26 00:01:54,430 --> 00:01:59,430 And in most cases they'll go ahead and tell the administrator of that system. 27 00:01:59,650 --> 00:02:06,880 But what they do is still illegal because they test the security of systems that they do not own or 28 00:02:06,880 --> 00:02:09,780 do not have permission to test. 29 00:02:09,790 --> 00:02:15,500 Now one big question that people always ask is why Hartke Why teach or learn hacking. 30 00:02:15,640 --> 00:02:18,030 Well hacking is an existing industry. 31 00:02:18,040 --> 00:02:21,090 There are lots of job opportunities for ethical hackers. 32 00:02:21,190 --> 00:02:26,860 For people like us who will go ahead and test the security of systems to make sure that these systems 33 00:02:26,920 --> 00:02:33,610 are secure and not vulnerable to black hat hackers there is actually a huge demand for ethical hackers 34 00:02:33,610 --> 00:02:38,010 these days because of the increased amount of hacking attacks. 35 00:02:38,020 --> 00:02:43,040 So we on the day the big systems and big companies are getting hacked. 36 00:02:43,120 --> 00:02:50,070 Not so long ago Oberg got hacked and information of more than 56 million users were exposed. 37 00:02:50,290 --> 00:02:57,250 So companies like Obery Facebook and Google they hire hackers in order to try and hack into their systems 38 00:02:57,490 --> 00:03:01,450 and tell them where the weaknesses are so that they can fix it. 39 00:03:01,450 --> 00:03:06,970 They also have about bounty programs where they literally ask all the hackers around the world to go 40 00:03:06,970 --> 00:03:10,360 ahead and try to hack into their websites and their web applications. 41 00:03:10,510 --> 00:03:15,590 And if they could they will pay them a bounty for the box that they find. 42 00:03:15,630 --> 00:03:17,610 Now what's the hacking part covered. 43 00:03:17,640 --> 00:03:22,550 What discourse is not only a hacking course we will also cover programming. 44 00:03:23,100 --> 00:03:25,550 So what do we mean by programming. 45 00:03:25,890 --> 00:03:33,240 Well programming is the process of writing a program and this very definition leads us to the next question. 46 00:03:33,270 --> 00:03:34,700 What is a program. 47 00:03:34,980 --> 00:03:41,030 Well a program is a set of instructions that will allow us to solve a problem. 48 00:03:41,100 --> 00:03:45,110 For example we have the Facebook app or the Facebook website. 49 00:03:45,210 --> 00:03:48,520 And the problem that it solves is social networking. 50 00:03:48,540 --> 00:03:52,090 So it allows us to stay connected with our friends and family. 51 00:03:52,590 --> 00:03:56,110 Another example is your media player such as iTunes. 52 00:03:56,250 --> 00:03:59,440 It solves the problem of clean music for you. 53 00:03:59,550 --> 00:04:07,620 So if you think of it any program that you use solves a certain problem so program it is the process 54 00:04:07,680 --> 00:04:11,330 of writing a program to solve a problem. 55 00:04:11,340 --> 00:04:18,330 Now since this is a hacking and program of course our problem is always going to be trying too hard 56 00:04:18,540 --> 00:04:20,210 into a certain system. 57 00:04:20,520 --> 00:04:26,830 So basically we will be writing programs that will allow us to hack into networks computers Web sites 58 00:04:26,970 --> 00:04:34,670 and so one now the solution for the problem cannot be written in plain English you're going to have 59 00:04:34,670 --> 00:04:38,110 to write it in a language that the computer can understand. 60 00:04:38,330 --> 00:04:41,980 So you're going to have to use a programming language to do that. 61 00:04:43,070 --> 00:04:47,130 Now you can use any programming language to write programs for hacking. 62 00:04:47,450 --> 00:04:51,830 But in this course we're only going to be using Python. 63 00:04:51,830 --> 00:04:58,730 The reason why I think Python because it's a very simple language yet powerful it's open source and 64 00:04:58,790 --> 00:05:05,660 object oriented and it has great libraries that can be used for both for hiking and for writing very 65 00:05:05,660 --> 00:05:09,010 useful normal programs other than hacking programs. 66 00:05:10,210 --> 00:05:14,760 Now the last question that you might think we covered why you'd want to learn hacking. 67 00:05:14,830 --> 00:05:17,150 But why would you want to learn programming. 68 00:05:17,410 --> 00:05:23,560 Well programming is a very very important skill these days everything around us is controlled by computers 69 00:05:23,830 --> 00:05:27,850 and the only way to communicate with computers is to write programs. 70 00:05:27,850 --> 00:05:33,280 Some countries are even starting to teach programming to their school children because they think it 71 00:05:33,280 --> 00:05:37,390 is just as important as learning math on other subjects. 72 00:05:37,870 --> 00:05:43,540 Now since you want to be a hacker or you're interested in hacking then programming is very very important 73 00:05:43,540 --> 00:05:49,120 for you especially because it will allow you to start implementing your own attacks. 74 00:05:49,210 --> 00:05:54,670 So instead of using other tools made by other people you're going to be able to write your own tools 75 00:05:54,820 --> 00:06:00,710 to exploit witnesses that you discover or to carry out attacks that nobody has ever implemented. 76 00:06:01,150 --> 00:06:06,760 Not only that but you're going to have the ability to read programs written by other people and extend 77 00:06:06,760 --> 00:06:13,000 them fix them if they have bugs or extend them to make them fit your situation or your scenario. 8423

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.