Sharing Is Caring:

Mastering Password Security: Pwned On Python

Pwned On Python

  • New
  • Rating: 0.0 out of 50.0 (0 ratings)
  • 722 students
  • 1hr 3min of on-demand video
  • Created by Stephen Chesnowitz
  • English

What you’ll learn

  • Understanding Password Security and Hashing. Learn the importance of password security and the risks associated with using compromised passwords.
  • Discover what the Pwned API is and how it can be used to check if a password has been pwned or part of a data breach. Learn how to make API requests
  • Understand the importance of writing modular and reusable code in Python. Learn how to define and implement functions to break down complex tasks.
  • Combine the knowledge of password hashing and API interaction to build a practical password checker tool.

Requirements

  • No programming experience is needed.

Description

In this Udemy course, “Mastering Password Security:  Pwned On Python,” you will delve into the critical aspects of password security, the risks associated with compromised passwords, and how hashing plays a pivotal role in safeguarding sensitive data. By the end of this course, you will have gained invaluable knowledge and practical skills to create secure password hashing systems and build a powerful password checker tool using Python.

Building a Password Checker Tool:

  • Combine the knowledge of password hashing and API interaction to build a practical password checker tool.
  • Develop a Python script that allows users to input passwords, hash them, and check for potential breaches using the Pwned API.
  • Enhance the tool by organizing code into functions
  • Learn to use hashlib and the requests library.
Read Also -->   Cucumber, Selenium & Java - in under 2 Hours! - [New 2023]

Organizing Python Code into Functions:

  • Understand the importance of writing modular and reusable code in Python.
  • Learn how to define and implement functions to break down complex tasks into manageable units.
  • Apply best practices for code organization, enhancing code readability, and maintainability.

By the end of this course, you will have developed a strong foundation in working with Python, some of its libraries, proficiency in working with the Pwned API, and the ability to create efficient and organized Python code. You will be empowered to build your password security tools, contribute to enhancing cybersecurity practices, and ensure the safety of sensitive information online. Join us now and take a step towards becoming a formidable defender of data integrity and privacy.

Who this course is for:

  • Beginner Python developers looking to create a great project to include on a resume

Show less

Course content

2 sections • 8 lectures • 1h 2m total lengthCollapse all sections

Course Resources1 lecture • 1min

  • Resources00:02

Interacting with Pwned API using Python7 lectures • 1hr 3min

  • Overview05:01
  • Setting Up – VENV, Requests and Hashlib04:45
  • Requests05:21
  • Hashlib12:43
  • Looping For Results11:07
  • Explainer For The Loop05:26
  • Functions18:31

👇👇👇👇 Click Below to Enroll in Free Udemy Course 👇👇👇👇

Go to Course

👇👇 See Also 👇👇

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO