|
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools. Table of Contents:
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 2: Footprinting and Social Engineering.
Chapter 3: Scanning and Enumeration.
Chapter 4: System Hacking.
Chapter 5: Trojans, Backdoors, Viruses, and Worms.
Chapter 6: Sniffers.
Chapter 7: Denial of Service and Session Hijacking.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
Chapter 9: SQL Injection and Buffer Overflows.
Chapter 10: Wireless Hacking.
Chapter 11: Physical Security.
Chapter 12: Linux Hacking.
Chapter 13: Evading IDSs, Honeypots, and Firewalls.
Chapter 14: Cryptography.
Chapter 15: Penetration Testing Methodologies.
Glossary. ISBN - 8126511966
|
|
Pages : 238
|