David bombal also has a few videos on Python for ethical Hackers on his youtube channel and also a wonderful Python Network Programming for Network Engineers (Python 3) udemy course (udemy.com/course/python-…)
5) NOW YOU GOT THE FOUNDATION ,WHAT'S THE NEXT STEP?
You are ready to start hacking. Here is are my favourite youtube channels and resources to start from.
Great guy to learn hacking from, I love his way of teaching. Additionally, his youtube channel has proven useful to me, so I don't hesitate to recommend it.
That's it for this thread there was part one be sure to check it out. If you found this thread useful retweet the first tweet and follow me (@xtremepentest) for future linux, networking, python and cybersecurity content.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Also, please note that I'm not a professional hacker or pentester. I'm still learning to be, so these are the resources I have found useful along my journey.
THE FUNDAMENTALS SKILLS REQUIRED👇
1) Basic IT skills.👶🍼
If you are brand new to IT, I strongly recommend this course.
This is a FREE course by Professor Messer – professormesser.com/free-a-plus-tr…
#Learn 🧠🐍#python: Sometimes when programming in python they're situations when you want to copy the contents of an existing list into another. Python has several ways of achieving that. In this thread you will learn different ways of achieving that with the help of examples.
1) Using the equal (=) sign operator:
Using = operator you can copy the contents of an existing list onto another/new list. But there's a problem with this method which I will explain on the next section.
The problem with the above method is that if you modify the new copied_fruits list the original list (fruits) is modified too, this is because the copied list (copied_fruits) is referencing/ pointing to same fruits list in memory.