Passed GPYC (SANS573/ Python Coder)

MalwareMikeMalwareMike GSEC, GCIH, GCIA, GWAPT, RHCSA, WCNAMember Posts: 147 ■■■□□□□□□□

Overview

*3 books (Book 1 covered days 1-2, book 2 covered days 3-5, book 3 covered day 6)
*PyWars: 50+ python exercises  (30+ problems for book 1 and 20+ problems for book 2)

Days 1 and 2 (Python Fundamentals I and II)

If you have a decent amount of Python experience, you will fly through book 1 because it's all about the basics (functions, flow control, data structures, etc). If you're new to Python, Book 1 will be informative and fun. Below are some helpful resources if you are new to Python

Learn Python the Hard Way: https://learnpythonthehardway.org/
Full Stack Python: https://www.fullstackpython.com/table-of-contents.html
Codewars: https://www.codewars.com/

Days 3,4, and 5 (Defensive, Forensics, and Offensive)

Book 2 is where most of the fun takes place. Day 3 deals with working with files, regex, log parsing, and packet analysis (make sure you know regex, there were a ton of questions on the exam regarding it). Day 4 covered acquiring images from disk, SQL, and communicating with the web (requests/urllib2). Day 5 goes into using Python for pen-testing tasks (backdoors, process execution, network socket operations, and Python objects).

Make sure you have a firm grasp on the following Python modules


I think this class would be very helpful for new Python coders because it covers the basics, has infosec related Python problems, and  provides ideas on how to use Python in the information security field. For intermediate and above coders, I don't recommend this course. Instead, I would review the modules above and then look at other SANS courses where you could use your Python knowledge.

Current: GSEC, GCIH, GCIA, GWAPT, GYPC, RHCSA, WCNA
2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
Twitter: https://twitter.com/Malware_Mike
Website: https://www.malwaremike.com

Tagged:

Comments

  • _netmon_netmon Level 99 Wizard Mod Posts: 878 Mod
    Congrats on the pass!
    2020 goals: Server 2016 MCSA/MCSE (70-740, 70-741, 70-742, 70-744), Powershell training
    2021 goals: RHCSA/RHCE, AWS, Python training

    Train people well enough so they can leave, treat them well enough so they don't want to. - Richard Branson
  • LonerVampLonerVamp OSCP, GCFA, GWAPT, CISSP, OSWP, CCNA Cyber Ops, Sec+, Linux+, AWS SAA, CCSK Member Posts: 487 ■■■■■■■□□□
    First, congrats on the pass!

    Second, I love this review. I've had this Python course on my list for a while now. On a scale of 1-10, I'd consider myself exposed to Python, minorly experienced, but not yet towards intermediate with it. Basically, probably a perfect spot to consume a course like this one.

    Love the additional insight into what to learn/know. Being realistic about things like this and alternates to learning are cool. Nice job!

    Security Engineer/Analyst/Geek, Red & Blue Teams
    OSCP, GCFA, GWAPT, CISSP, OSWP, CCNA Cyber Ops, Sec+, Linux+, AWS SA-A, CCSK
    2020 goals: AWS Security Specialty, AWAE or SLAE, CISSP-ISSAP?
  • averageguy72averageguy72 Senior Member Member Posts: 320 ■■■■□□□□□□
    Congrats!
    CISSP / CCSP / CCSK / CRISC / CISM / CISA / CASP / Security+ / Network+ / A+ / CEH / eNDP / AWS Certified Advanced Networking - Specialty / AWS Certified Security - Specialty / AWS Certified DevOps Engineer - Professional / AWS Certified Solutions Architect - Professional / AWS Certified SysOps Administrator - Associate / AWS Certified Solutions Architect - Associate / AWS Certified Developer - Associate / AWS Cloud Practitioner
  • MalwareMikeMalwareMike GSEC, GCIH, GCIA, GWAPT, RHCSA, WCNA Member Posts: 147 ■■■□□□□□□□
    @LonerVamp I'm happy to help, let me know if you have any additional questions.
    Current: GSEC, GCIH, GCIA, GWAPT, GYPC, RHCSA, WCNA
    2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
    Twitter: https://twitter.com/Malware_Mike
    Website: https://www.malwaremike.com

Sign In or Register to comment.