Two focused PDF study guides. One clean learning hub.

Learn core Python first, then apply it to security-focused automation.

This repository packages two substantial notebooks as downloadable PDFs. One builds strong Python fundamentals from the ground up. The other shows how Python concepts translate into cybersecurity workflows, tooling ideas, and lab-oriented projects.

  • 2downloadable notebooks
  • Beginner to intermediatelearning path
  • Theory plus projectspractical coverage

Notebook Guide

What each notebook is for

Notebook 01

The Pythonic Odyssey

A structured Python guide that starts with zero assumptions and moves through syntax, data structures, control flow, functions, file handling, object-oriented programming, advanced Python features, and virtual environments.

Best for
New learners, revision, interview preparation
Coverage
Core Python fundamentals to intermediate patterns
Includes
Examples, mini projects, tricks, and workflow basics
Read or download the PDF

Notebook 02

Python for CyberSecurity

A security-oriented notebook that connects Python syntax and scripting skills to networking, automation, package usage, subprocess safety, common security libraries, and guided project ideas for lab environments.

Best for
Learners moving from Python basics into security practice
Coverage
Automation, scanning concepts, libraries, secure scripting habits
Includes
Projects, tool overviews, ethical-use framing
Read or download the PDF

Recommended Order

A simple path through the material

Step 1

Build the foundation

Start with The Pythonic Odyssey if you are new to Python or need a full refresher.

Step 2

Practice the core topics

Work through strings, collections, conditions, loops, functions, file handling, and OOP before moving on.

Step 3

Move into security use cases

Use the cybersecurity notebook after you are comfortable reading and writing small Python scripts.

Step 4

Explore my projects

Visit the Project section and my repos to see the projects in action and understand how the concepts are applied.

Step 5

Stay inside safe labs

Apply the security material only in authorized environments and treat the projects as educational exercises.

Coverage Map

Topics and subtopics at a glance


The Pythonic Odyssey

  • Python basics, setup, modules, pip, comments
  • Variables, data types, operators, and type casting
  • Strings, slicing, indexing, and common string methods
  • Lists, tuples, dictionaries, and sets
  • Conditional logic and loops
  • Functions, recursion, and small projects
  • File input and output
  • Classes, objects, inheritance, decorators, and operator overloading
  • Type hints, exceptions, list comprehensions, lambda, map, filter, reduce
  • Virtual environments and productivity tricks

Python for CyberSecurity

  • Why Python works well for security tasks
  • Syntax, variables, data types, loops, functions, file handling, and errors
  • Package management with pip and dependency installation
  • Libraries such as os, subprocess, socket, requests, scapy, paramiko, and python-nmap
  • Safer subprocess usage and input handling
  • Networking and scan automation concepts
  • Project-based learning for MAC changes, netcat automation, Nmap scanning, and more
  • Ethical-use boundaries for offensive-leaning examples

Supporting Projects

More projects from me

Who This Helps

Designed for self-learners who want one clean progression.

If you want a single repository that explains what to study, where to start, and what practical areas each notebook covers, this project now does that directly from the README and the GitHub Pages site.

Repository Use

Use it as a reading hub, revision guide, and download page.

Open the website from GitHub Pages for a polished overview, then jump into the PDFs for the full notes. The repository also includes validation tests and workflow automation so the presentation stays reliable.

FAQ

Common questions


Do I need Python experience before reading the cybersecurity notebook?

A basic understanding of variables, loops, functions, and file handling will help. The Pythonic Odyssey is the recommended first stop.

Are these notebooks executable Jupyter notebooks?

No. In this repository they are published as PDF study guides, so the site focuses on explanation, navigation, and direct access.

Can I use the security content on real targets?

No. Use the material only in environments where you have explicit authorization. The repository is for learning and responsible practice.