In this chapter, we have explored the use of Python in defensive security. It should be noted that we have only captured a small portion of how Python can be used in defensive security. There are numerous other uses, including orchestration, automating repetitive tasks, developing correlating scripts that relate IDS/IPS signatures with Qualys/Nessus CVEs. This chapter has laid a foundation of how Python can be used and I would encourage the reader to carry out further research.
In the next chapter, we are going to see a few other general cyber security use cases in which Python comes in handy.