All language subtitles for 003 Introduction to Python Programming & Ethical Hacking_en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian Download
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,810 --> 00:00:05,130 Now, as I promised you, this course is going to be highly practical. 2 00:00:05,130 --> 00:00:08,760 But I also promised that I will not neglect the theory. 3 00:00:09,210 --> 00:00:14,850 So I want to cover some terminology before we jump into hacking and programming. 4 00:00:15,750 --> 00:00:22,890 Now, what we mean by hacking is being able to gain access to a system that you're not supposed to have 5 00:00:22,890 --> 00:00:23,940 access to. 6 00:00:23,970 --> 00:00:30,510 So, for example, logging into an email account that you're not supposed to have access to is considered 7 00:00:30,540 --> 00:00:31,020 hacking. 8 00:00:31,020 --> 00:00:38,190 That account, gaining access to a remote computer that you're not supposed to have access to is hacking 9 00:00:38,220 --> 00:00:39,300 that computer. 10 00:00:39,390 --> 00:00:45,450 Reading information that you're not supposed to be able to read again is considered hacking. 11 00:00:46,170 --> 00:00:52,290 So you can see that there is a large number of ways to hack into a system, and the word hacking can 12 00:00:52,290 --> 00:00:54,060 refer to a number of things. 13 00:00:54,060 --> 00:01:00,750 But the main concept is the same gaining access or being able to do things that you're not supposed 14 00:01:00,750 --> 00:01:03,840 to be able to do is considered hacking. 15 00:01:04,379 --> 00:01:06,900 Now, there are three main types of hackers. 16 00:01:06,900 --> 00:01:08,670 We have the black hat hackers. 17 00:01:08,670 --> 00:01:15,900 These are the bad people that hack systems illegally in order to steal money or to achieve their own 18 00:01:15,900 --> 00:01:17,190 illegal goals. 19 00:01:17,910 --> 00:01:21,150 The second part of hackers are the white hat hackers. 20 00:01:21,150 --> 00:01:22,500 So this is us. 21 00:01:22,890 --> 00:01:29,550 These people use the same techniques used by the Blackhat hackers, and they also hack into systems, 22 00:01:29,550 --> 00:01:37,170 but they only hack into systems that they have permission to hack in order to test the security of these 23 00:01:37,170 --> 00:01:37,950 systems. 24 00:01:38,700 --> 00:01:42,110 And finally, we have the grey hat hackers. 25 00:01:42,120 --> 00:01:44,400 These are a mixture of the two. 26 00:01:44,400 --> 00:01:50,460 So they'll hack into any system, even if they don't have permission to test the security of the system. 27 00:01:50,610 --> 00:01:54,300 But they will never steal money or damage that system. 28 00:01:54,300 --> 00:01:59,400 And in most cases, they'll go ahead and tell the administrator of that system. 29 00:01:59,400 --> 00:02:06,840 But what they do is still illegal because they test the security of systems that they do not own or 30 00:02:06,840 --> 00:02:08,820 do not have permission to test. 31 00:02:09,570 --> 00:02:13,530 Now, one big question that people always ask is why hacking? 32 00:02:13,530 --> 00:02:15,390 Why teach or learn hacking? 33 00:02:15,420 --> 00:02:17,990 Well, hacking is an existing industry. 34 00:02:18,000 --> 00:02:23,550 There are lots of job opportunities for ethical hackers, for people like us who would go ahead and 35 00:02:23,550 --> 00:02:30,000 test the security of systems to make sure that these systems are secure and not vulnerable to blackhat 36 00:02:30,030 --> 00:02:30,710 hackers. 37 00:02:30,720 --> 00:02:37,260 There is actually a huge demand for ethical hackers these days because of the increased amount of hacking 38 00:02:37,260 --> 00:02:37,860 attacks. 39 00:02:37,860 --> 00:02:42,690 So we hear on the daily big systems and big companies are getting hacked. 40 00:02:42,900 --> 00:02:50,070 Not so long ago, Uber attacked and information of more than 56 million users were exposed. 41 00:02:50,070 --> 00:02:56,670 So companies like Uber, Facebook and Google, they hire hackers in order to try and hack into their 42 00:02:56,670 --> 00:03:00,930 systems and tell them where the weaknesses are so that they can fix it. 43 00:03:01,320 --> 00:03:07,200 They also have bug bounty programs where they literally ask all the hackers around the world to go ahead 44 00:03:07,200 --> 00:03:10,320 and try to hack into their websites and with their web applications. 45 00:03:10,320 --> 00:03:14,190 And if they could, they will pay them a bounty for the box that they find. 46 00:03:15,460 --> 00:03:17,430 Now, thus the hacking part covered. 47 00:03:17,440 --> 00:03:22,120 But this course is not only a hacking course, we will also cover programming. 48 00:03:22,870 --> 00:03:25,330 So what do we mean by programming? 49 00:03:25,750 --> 00:03:29,500 Well, programming is the process of writing a program. 50 00:03:29,920 --> 00:03:33,160 And this vague definition leads us to the next question. 51 00:03:33,160 --> 00:03:34,570 What is a program? 52 00:03:34,750 --> 00:03:40,660 Well, a program is a set of instructions that will allow us to solve a problem. 53 00:03:40,900 --> 00:03:47,650 For example, we have the Facebook app or the Facebook website, and the problem that it solves is social 54 00:03:47,650 --> 00:03:48,370 networking. 55 00:03:48,370 --> 00:03:51,640 So it allows us to stay connected with our friends and family. 56 00:03:52,390 --> 00:03:56,110 Another example is your media player such as iTunes. 57 00:03:56,140 --> 00:03:58,990 It solves the problem of playing music for you. 58 00:03:59,350 --> 00:04:04,420 So if you think of it, any program that you use solves a certain problem. 59 00:04:05,290 --> 00:04:10,690 So programming is the process of writing a program to solve a problem. 60 00:04:11,110 --> 00:04:18,399 Now, since this is a hacking and programming course, our problem is always going to be trying to hack 61 00:04:18,399 --> 00:04:19,990 into a certain system. 62 00:04:20,350 --> 00:04:26,860 So basically, we will be writing programs that will allow us to hack into networks, computers, websites 63 00:04:26,860 --> 00:04:27,820 and so on. 64 00:04:29,320 --> 00:04:30,040 Now. 65 00:04:30,040 --> 00:04:33,970 The solution for the problem cannot be written in plain English. 66 00:04:34,000 --> 00:04:38,020 You're going to have to write it in a language that the computer can understand. 67 00:04:38,080 --> 00:04:41,950 So you're going to have to use a programming language to do that. 68 00:04:42,910 --> 00:04:47,110 Now you can use any programming language to write programs for hacking. 69 00:04:47,200 --> 00:04:51,250 But in this course, we're only going to be using Python. 70 00:04:51,640 --> 00:04:56,950 The reason why I picked Python because it's a very simple language, yet powerful. 71 00:04:57,280 --> 00:05:04,150 It's open source and object oriented, and it has great libraries that can be used for both for hacking 72 00:05:04,150 --> 00:05:05,230 and for writing. 73 00:05:05,230 --> 00:05:09,010 Very useful normal programs other than hacking programs. 74 00:05:10,040 --> 00:05:15,320 Now, the last question that you might think we covered, why you'd want to learn hacking, but why 75 00:05:15,320 --> 00:05:17,030 would you want to learn programming? 76 00:05:17,240 --> 00:05:20,900 Well, programming is a very, very important skill these days. 77 00:05:20,930 --> 00:05:23,630 Everything around us is controlled by computers. 78 00:05:23,630 --> 00:05:27,590 And the only way to communicate with computers is to write programs. 79 00:05:27,620 --> 00:05:33,290 Some countries are even starting to teach programming to their school children because they think it 80 00:05:33,290 --> 00:05:37,010 is just as important as learning maths and other subjects. 81 00:05:37,670 --> 00:05:42,920 Now, since you want to be a hacker or you're interested in hacking, then programming is very, very 82 00:05:42,920 --> 00:05:49,040 important for you, especially because it will allow you to start implementing your own attacks. 83 00:05:49,040 --> 00:05:54,710 So instead of using other tools made by other people, you're going to be able to write your own tools 84 00:05:54,710 --> 00:06:00,380 to exploit weaknesses that you discover or to carry out attacks that nobody has ever implemented. 85 00:06:00,950 --> 00:06:06,770 Not only that, but you're going to have the ability to read programs written by other people and extend 86 00:06:06,770 --> 00:06:12,980 them, fix them if they have bugs, or extend them to make them fit your situation or your scenario. 8833

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.