Howard Poston

Howard Poston is a freelance cyber and blockchain researcher, trainer, consultant and software developer. Howard has experience developing quality educational content, providing security assessments, research and code development for academic and industry projects. He specializes in cryptography, blockchain, malware analysis, and cybersecurity. Howard holds a Bachelor's degree in computer and electrical engineering from the University of Dayton.

Sort options

Execution, persistence, privilege escalation and evasion (Coursera)

This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion
0
No votes yet

Introduction to Python for Cybersecurity (Coursera)

Jan 24th 2022
Introduction to Python for Cybersecurity (Coursera)
Course Auditing
Categories
Effort
Languages
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives.
0
No votes yet

Defensive Python (Coursera)

Jan 17th 2022
Defensive Python (Coursera)
Course Auditing
Categories
Effort
Languages
This course demonstrates the use of Python for network analysis to detect and hijack suspicious connections.
0
No votes yet

Advanced Python - Reconnaissance (Coursera)

Jan 17th 2022
Advanced Python - Reconnaissance (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to advanced Python for Cybersecurity. The Reconnaissance course demonstrates the use of Python to automate the process of performing reconnaissance on target environments. We will also demonstrate how Python can be used to automate a password guessing attach to gain initial access to a target [...]
0
No votes yet

Establishing Command-and-Control and Finding Credentials (Coursera)

Jan 17th 2022
Establishing Command-and-Control and Finding Credentials (Coursera)
Course Auditing
Categories
Effort
Languages
This course demonstrates the use of Python to establish command-and-control channels between a target environment and the attackers infrastructure. This course also demonstrates the use of Python to collect information on a system, including both user credentials and other sensitive data.
0
No votes yet