Windows - Other
Ethical Hacking L1 3 org
Torrent info
Torrent Files List
Torrent description
~ Seedmore ~
Hi m8! Were you thinking about joining a private tracker, well what are you waiting for!! we are a Italian Mob theme website with a new twist ;)
we are focused on fast uploads, new content, and above all: user security ;)
are you also tired of malware and Hit & Runners,:(
Are you an experienced uploader Huh, See forums for how to apply.
well what are you waiting for doors will not be open for long so start typing to join: http://tinyurl.com/seedmore NOW!!!!!!
I want to see you at Seedmore.org :)
Ethical Hacking and Network Defense
Spring 2009 Sam Bowne
These lectures are from the college course "CNIT 123: Ethical Hacking and Network Defense" at City College San Francisco. Powerpoint files, lecture notes, and detailed hands-on projects are all here.
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Ch 1: Ethical Hacking Overview
Ch 2: TCP/IP Concepts Review
Ch 3: Network and Computer Attacks
Ch 4: Footprinting and Social Engineering
Ch 5: Port Scanning
Ch 6: Enumeration
Ch 7: Programming for Security Professionals (including: hello.c, hello2.c, hello3.c, loopdemo.c, pingscan.c, branch.plx, hello.plx, hello2.plx, leet.plx, pingscan.plx)
Ch 8: Microsoft Operating System Vulnerabilities
Ch 9: Linux Operating System Vulnerabilities
Ch 10: Hacking Web Servers
Ch 11: Hacking Wireless Networks
Ch 12: Cryptography
Ch 13: Protecting Networks with Security Devices
Lecture 14: More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP)
Lecture 15: Stealing Passwords from HTTPS Sessions with a Man-in-the-Middle Attack
Included videos:
Chapter 01_ Ethical Hacking Overview.m4v
Chapter 02_ TCP_IP Concepts, Part1.m4v
Chapter 02_ TCP_IP Concepts, Part2.m4v
Chapter 03_ Network and Computer Att.m4v
related torrents
comments (0)
RECENT SEARCHES search cloud »
- x art 19 cornelia
- vce pdf
- OxTorrent cc A Very English Scandal S01E03 FiNAL FRENCH LD AMZN WEB DL x264 FRATERNiTY mkv
- MacGyver s04
- Wild Card
- Xena warrior princess season 5
- vids
- Reader s Digest Music This Is My Song 60 Hits
- Private Gold 180 Sex Junkies 2014 Split Scenes
- Hugh Howey Molly Fyde and the Fight for Peace