Course overview

Overview

Python for Pentesting is designed for pentesters who want to use Python to build specialized tools. This challenging course will expose students to target scanning, enumeration, exploit development, web application attacks, and persistence mechanisms through Python scripting. Upon completion, students will have built an arsenal of over 20 penetration testing tools.

This course is designed for students who have basic programming/scripting experience in C or Python, knowledge of networking concepts, and knowledge of penetration testing methods and hacking tools.

Student Experience

This online, remote-live course is offered as a 4-weekend program from Sat-Sun 9:00 AM-2:00 PM CT.

Expert-Led Instruction That Gets You Job-Ready: Become an elite ethical hacker. Gain skills and collaborate with leading professionals through lectures, research exercises, and real-world simulations.

Exclusive Access to Leaders in Security: Our program offers countless opportunities to learn and engage with security professionals from around the world through guest speakers, alumni gatherings, and topical community events.

Gain a Valuable Professional Network: Transform and grow your career alongside peers (and potential collaborators) on campus and in our Connected Classroom. The DA community is a priceless resource — just ask our alumni.

Course Details

Skill Level: Intermediate, Advanced

Prerequisites:Essential Python Programming; cybersecurity domain knowledge; some pentesting experience

What you’ll learn:

Introduction to Building Pentest tools: Students will review Python fundamentals and will develop target scanning and enumeration tools using modules from the Python Standard Library as well as third party modules.

Scanners: Students will begin by creating custom scanners using the Nmap module. They will develop algorithms to parse complex data sets and build additional functionality into their custom tools.

Exploit Development: Students will begin by taking a deep look at x86 memory architecture, operating system controls and debugging. Students will then learn how to construct exploits against stack-based buffer overflows, as well as how to embed shellcode into their Python scripts.

Exploit Web Application Vulnerabilities: Students will learn about common web application vulnerabilities, reconnaissance methods and attack vectors. Students will then write code to identify and exploit Standard Query Language (SQL) and Cross-Site Scripting (XSS) vulnerabilities to reveal server-side details, as well as to find directory traversal vulnerabilities.

Post-Exploitation: Students will learn how to conduct post-exploitation pillaging and employ persistence techniques. They will then learn how to build reverse shells, send encoded data via HTTP requests, and control their persistence tool via command-and-control mechanisms. By the end of the course the students will have the knowledge necessary to analyze technical situations, solving them through the development of Python tools.

Instructors

Our instructors represent the brightest professionals from companies like Microsoft, Amazon Web Services, and Sabre. They bring in-depth experience from the field to the classroom each day, providing invaluable insights into succeeding on the job.

Shane Walker, Dallas, ‎Cybersecurity Instructor

Trevor Bowman, Texas, Cybersecurity Instructor

Thor Munoz, Colorado, ‎Cybersecurity Instructor

Ekzhin Ear, Colorado, ‎Cybersecurity Instructor

Juan Reyes, Colorado, Cybersecurity Instructor

Vatrick Ramble, Georgia, Cybersecurity Instructor

Career Support

Strategy and Accountability: Our Career Services team works with you to individualize your path to a new career. Stay on track and motivated from the first day of class!

Resume Review: Learn how to design and tailor your resume to land the career you are looking for. Remember: every word counts.

LinkedIn Optimization: LinkedIn profiles are now mandatory extensions of our resumes. Setting up a thoughtful, well-written profile is the make or break for many inquiring employers. Using industry tips and tricks, we’ll work with you to spruce up yours.

Interview Preparation: Set up mock interviews to nail the real thing. Learn to develop effective interview strategies, get detailed feedback, and reduce stress before actual interviews.

Networking Opportunities: Learn how to navigate uncharted networking waters, tap into our expanding Divergence Alumni network, and watch your support and contacts grow!

The Academy supports a full range of Financial Aid, Scholarship, Income Share Agreement, Education Loan and local Grant Programs for Data Science Immersive students. Follow the links below for details on each option

Tuition & Finance

View tuition & assistance info

Job Placement Possibilities

View employers who’ve hired our students

Admissions Process

View our admissions process

GI Bill®

For U.S. veterans, military spouses, and dependents of veterans.
GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website.

Scholarships

Apply for grants with your local Workforce Solutions Office, that provide career services to underrepresented communities in tech.

Loans

Apply for a loan from one of our high-quality lender – Skills.Fund.
Financing as low as $450 a month

Installments

Divide tuition into three payments.
Currently only available in select U.S. markets.

Full Tuition (With Pay Upfront Discount)

Other Funding Options

Contact Admissions at 833-DIVERGE for funding options you may be eligible for.

Admissions Tour

Come visit our new training facility

Schedule an Admissions tour with our team to explore our new 10,000 sq ft space. Grab a coffee and meet Bear (our reigning, four-legged Chief Happiness Officer), step into a classroom, or find a comfy lounge and chat with one of our many helpful staff, alumni, or students about their experience here at Divergence Academy.

Admissions Process

Step 1

Research

So you want to be an ethical hacker, social engineer, data analyst, data scientist, or data visualizer? Maybe you've heard the cloud is where it's at, or you're an industry veteran that needs a skills refresh. Ask Google, do some research, search profiles on LinkedIn, and ask questions. Curiosity and a knack for research are essential skills for a technologist. Spend some time and bring your questions to the next step.

Step 2

Apply

Let's talk through it: your background, chosen path, weekday or weekend schedule, funding options, and more. Schedule an appointment with our Admissions Team.

Step 3

Online Wookie Course

Curious folks, we will not make you wait to get started on your learning journey. You'll be enrolled from the get-go in either Data or Cyber Wookie. Each provides valuable resources to help our future data scientists or ethical hackers prep for the first day of class.

Step 4

Decision

Congrats! Your funding has been verified and you are accepted into the program. Be on the lookout for a personalized Acceptance Letter via e-mail. You can always call us at 833-DIVERGE.

Step 5

Orientation

Experiencing first day jitters? Here's how we can help.
A week before your program starts, our Community Manager will get you onboarded to the learning platform, walk you through TWC enrollment paperwork, and connect you with future classmates.

Step 6

Ask Questions

"Besides technology skills, what else will help me land a solid job?"
Soft Skills.
And guess what? You can start practicing TODAY.

Frequently asked questions

Divergence Academy follows a 16:1 student to teacher ratio. Classrooms are equipped with six foot training tables, swivel ergonomic chairs and computers for each student. Instructors have flexible desk for standing or sitting, big screen TVs to display, whiteboards and the same capabilities for remote delivery.

“The Army’s COOL (Credentialing Opportunities On-Line), also known as Credentialing Assistance (CA) helps soldiers find information on certifications and licenses related to their jobs.  The program can pay for courses and exams that lead to industry-recognized civilian credentials in an occupational area of your choice.”

“Civilian credentials are important for two reasons:

Career Advancement Civilian credentialing can contribute to military career development, and may be accepted for self-development requirements and in performance evaluations.

Smoother Transitions When you transition back to civilian employment, credentials help you translate your military training and experience into something civilian employers can easily recognize. That can help you get hired, get a better job, or be promoted sooner!”

“CA is subject to the same funding ceiling as Tuition Assistance (TA). A Soldier may use both TA and CA; however, you can’t get more than $4,000 total from both programs per fiscal year.”

“Eligible Soldiers include those who are: Regular Army, Active Guard/Reserve (AGR) pursuant to Title 10 and Title 32, U.S. Army Reserve (USAR), and Army National Guard (ARNG) in an active drilling status with a designation as satisfactory.”