Blackhat Python
A tailored, in-depth course on the process of thought and execution of cyber-attacks, using Python as the main driver, to foster more accurate prevention/mitigation strategies.
40 hours
Red Team
40 hours
Red Team


Python’s popularity and relevance have escalated over the last few years, overthrowing some historical leaders as a trailblazing programming language. However, its widespread use has opened the door to dangerous cyber-attacks, which security teams should be aware of.  Cyber and security teams must understand the thought and execution processes of cyber attackers which use Python as a main driver for their incidents. By undergoing specialist Blackhat Python training, Defense teams would further enhance their prevention and mitigation strategies, limiting potential costly and system- or network-damaging attacks.  
CYBERPRO’s Blackhat Python course is a practical program for trainees to elevate their prevention and mitigation skills related to Python-based attacks, aiming to help them identify vulnerabilities within their workspaces and work around them to preserve security.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Introduction to Blackhat Python
  • Who is it for
  • Why Python
  • Python for Pen Testers
  • Advantages and Disadvantages
Environment and Basics
  • Python Environment variables
  • Setting the path
  • Linux/Windows commands
  • Python IDE
Python Networking
  • What can we do with a TCP client
  • What can we do with a TCP server
  • What can we do with a UDP client
Decoding the IP Header
  • Decoding the IP header
  • Building a TCP sniffer for decoding
Packet Crafting with Scapy
  • About SCAPy
  • What can we do with Scapy
  • Writing simple packets with Scapy
Web Scraping
  • What is scraping
  • Why do we need it
  • Simple scraper
Replacing NetCat
  • Why replace NetCat
  • How it works
  • Building a NetCat
Automated Sandbox
  • What is a sandbox
  • Why do we need automation
  • Pentester usual workflow
  • Advanced PT workflow
  • The Bottom Line
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • IT & Cyber professionals
    • Basic Python programming
    • Python programming
    • Encoding and Decoding
    • Manipulating network systems and security tools
    • Plan, construct and execute a hack into a secured and monitored system
    • Data infiltration and exfiltration, DOS