Windows - Other

Ethical Hacking L1 3 org

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
Ethical Hacking L1 3 org

Download FREE And Anonymously

Torrent info

Name:Ethical Hacking L1 3 org

Total Size: 1.39 GB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Full Movie @ Movie4u

Last Updated: 0000-00-00 00:00:00 (Update Now)

Torrent added: 2009-08-28 05:35:51

VPN For Torrents

Torrent Files List

branch.plx (Size: 1.39 GB) (Files: 45)


0.14 KB


582.00 KB


2.65 MB


446.50 KB


998.50 KB


4.69 MB


3.03 MB


1.13 MB


1.96 MB


667.00 KB


1.14 MB


795.50 KB


2.16 MB


738.00 KB


926.50 KB


2.65 MB


1.66 MB


1.24 MB


1.69 MB


404.00 KB


521.50 KB


1.07 MB


1.63 MB


1.02 MB


1.23 MB


1.79 MB


2.62 MB

 Chapter 01_ Ethical Hacking Overview.m4v

442.78 MB

 Chapter 02_ TCP_IP Concepts, Part1.m4v

156.59 MB

 Chapter 02_ TCP_IP Concepts, Part2.m4v

294.27 MB

 Chapter 03_ Network and Computer Att.m4v

488.90 MB


29.50 KB


0.05 KB


0.05 KB


0.12 KB


0.16 KB


0.12 KB


572.00 KB


654.00 KB


241.50 KB


355.00 KB


0.15 KB


0.13 KB


0.10 KB


0.12 KB

Announce URL:

Torrent description

~ Seedmore ~

Hi m8! Were you thinking about joining a private tracker, well what are you waiting for!! we are a Italian Mob theme website with a new twist ;)
we are focused on fast uploads, new content, and above all: user security ;)
are you also tired of malware and Hit & Runners,:(
Are you an experienced uploader Huh, See forums for how to apply.
well what are you waiting for doors will not be open for long so start typing to join: NOW!!!!!!

I want to see you at :)

Ethical Hacking and Network Defense

Spring 2009 Sam Bowne

These lectures are from the college course "CNIT 123: Ethical Hacking and Network Defense" at City College San Francisco. Powerpoint files, lecture notes, and detailed hands-on projects are all here.

Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Ch 1: Ethical Hacking Overview

Ch 2: TCP/IP Concepts Review

Ch 3: Network and Computer Attacks

Ch 4: Footprinting and Social Engineering

Ch 5: Port Scanning

Ch 6: Enumeration

Ch 7: Programming for Security Professionals (including: hello.c, hello2.c, hello3.c, loopdemo.c, pingscan.c, branch.plx, hello.plx, hello2.plx, leet.plx, pingscan.plx)

Ch 8: Microsoft Operating System Vulnerabilities

Ch 9: Linux Operating System Vulnerabilities

Ch 10: Hacking Web Servers

Ch 11: Hacking Wireless Networks

Ch 12: Cryptography

Ch 13: Protecting Networks with Security Devices

Lecture 14: More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP)

Lecture 15: Stealing Passwords from HTTPS Sessions with a Man-in-the-Middle Attack

Included videos:

Chapter 01_ Ethical Hacking Overview.m4v

Chapter 02_ TCP_IP Concepts, Part1.m4v

Chapter 02_ TCP_IP Concepts, Part2.m4v

Chapter 03_ Network and Computer Att.m4v

related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu