
Sign up to save your podcasts
Or


Are you interested in a career in security using Python? Would you like to stay ahead of potential vulnerabilities in your Python applications? This week on the show, James Pleger talks about Python information security, incident response, and forensics.
James has been doing information security for over fifteen years, working at some of the biggest companies, government agencies, and startups. He shares numerous Python resources to dive into detecting threats and improving your projects.
We discuss how to learn about security topics and get involved in the community. Make sure you check out the massive collection of links in the show notes this week.
Course Spotlight: Exploring HTTPS and Cryptography in Python
In this course, you’ll gain a working knowledge of the various factors that combine to keep communications over the Internet safe. You’ll see concrete examples of how to keep information secure and use cryptography to build your own Python HTTPS application.
Topics:
Security Specific Tools Written in Python:
Incident Response and Memory Forensics:
Honeypot Resources:
Bug Bounty Programs:
Security and Hacking Conferences:
Additional Links:
Level up your Python skills with our expert-led courses:
Support the podcast & join our community of Pythonistas
By Real Python4.7
139139 ratings
Are you interested in a career in security using Python? Would you like to stay ahead of potential vulnerabilities in your Python applications? This week on the show, James Pleger talks about Python information security, incident response, and forensics.
James has been doing information security for over fifteen years, working at some of the biggest companies, government agencies, and startups. He shares numerous Python resources to dive into detecting threats and improving your projects.
We discuss how to learn about security topics and get involved in the community. Make sure you check out the massive collection of links in the show notes this week.
Course Spotlight: Exploring HTTPS and Cryptography in Python
In this course, you’ll gain a working knowledge of the various factors that combine to keep communications over the Internet safe. You’ll see concrete examples of how to keep information secure and use cryptography to build your own Python HTTPS application.
Topics:
Security Specific Tools Written in Python:
Incident Response and Memory Forensics:
Honeypot Resources:
Bug Bounty Programs:
Security and Hacking Conferences:
Additional Links:
Level up your Python skills with our expert-led courses:
Support the podcast & join our community of Pythonistas

288 Listeners

625 Listeners

579 Listeners

289 Listeners

302 Listeners

213 Listeners

988 Listeners

8,088 Listeners

969 Listeners

200 Listeners

207 Listeners

75 Listeners

310 Listeners

100 Listeners

70 Listeners