Summary

In this chapter, we have explored the use of Python in defensive security. It should be noted that we have only captured a small portion of how Python can be used in defensive security. There are numerous other uses, including orchestration, automating repetitive tasks, developing correlating scripts that relate IDS/IPS signatures with Qualys/Nessus CVEs. This chapter has laid a foundation of how Python can be used and I would encourage the reader to carry out further research.

In the next chapter, we are going to see a few other general cyber security use cases in which Python comes in handy.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.150.89