Options

Passed GPYC (SANS573/ Python Coder)

MalwareMikeMalwareMike Member Posts: 147 ■■■□□□□□□□

Overview

*3 books (Book 1 covered days 1-2, book 2 covered days 3-5, book 3 covered day 6)
*PyWars: 50+ python exercises  (30+ problems for book 1 and 20+ problems for book 2)

Days 1 and 2 (Python Fundamentals I and II)

If you have a decent amount of Python experience, you will fly through book 1 because it's all about the basics (functions, flow control, data structures, etc). If you're new to Python, Book 1 will be informative and fun. Below are some helpful resources if you are new to Python

Learn Python the Hard Way: https://learnpythonthehardway.org/
Full Stack Python: https://www.fullstackpython.com/table-of-contents.html
Codewars: https://www.codewars.com/

Days 3,4, and 5 (Defensive, Forensics, and Offensive)

Book 2 is where most of the fun takes place. Day 3 deals with working with files, regex, log parsing, and packet analysis (make sure you know regex, there were a ton of questions on the exam regarding it). Day 4 covered acquiring images from disk, SQL, and communicating with the web (requests/urllib2). Day 5 goes into using Python for pen-testing tasks (backdoors, process execution, network socket operations, and Python objects).

Make sure you have a firm grasp on the following Python modules


I think this class would be very helpful for new Python coders because it covers the basics, has infosec related Python problems, and  provides ideas on how to use Python in the information security field. For intermediate and above coders, I don't recommend this course. Instead, I would review the modules above and then look at other SANS courses where you could use your Python knowledge.

Current: GSEC, GCIH, GCIA, GWAPT, GYPC, RHCSA, WCNA
2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
Twitter: https://twitter.com/Malware_Mike
Website: https://www.malwaremike.com

Tagged:

Comments

  • Options
    LonerVampLonerVamp Member Posts: 518 ■■■■■■■■□□
    First, congrats on the pass!

    Second, I love this review. I've had this Python course on my list for a while now. On a scale of 1-10, I'd consider myself exposed to Python, minorly experienced, but not yet towards intermediate with it. Basically, probably a perfect spot to consume a course like this one.

    Love the additional insight into what to learn/know. Being realistic about things like this and alternates to learning are cool. Nice job!

    Security Engineer/Analyst/Geek, Red & Blue Teams
    OSCP, GCFA, GWAPT, CISSP, OSWP, AWS SA-A, AWS Security, Sec+, Linux+, CCNA Cyber Ops, CCSK
    2021 goals: maybe AWAE or SLAE, bunch o' courses and red team labs?
  • Options
    averageguy72averageguy72 Member Posts: 323 ■■■■□□□□□□
    Congrats!
    CISSP / CCSP / CCSK / CRISC / CISM / CISA / CASP / Security+ / Network+ / A+ / CEH / eNDP / AWS Certified Advanced Networking - Specialty / AWS Certified Security - Specialty / AWS Certified DevOps Engineer - Professional / AWS Certified Solutions Architect - Professional / AWS Certified SysOps Administrator - Associate / AWS Certified Solutions Architect - Associate / AWS Certified Developer - Associate / AWS Cloud Practitioner
  • Options
    MalwareMikeMalwareMike Member Posts: 147 ■■■□□□□□□□
    @LonerVamp I'm happy to help, let me know if you have any additional questions.
    Current: GSEC, GCIH, GCIA, GWAPT, GYPC, RHCSA, WCNA
    2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
    Twitter: https://twitter.com/Malware_Mike
    Website: https://www.malwaremike.com

Sign In or Register to comment.