Temporarily Out of Stock Online
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
|Product dimensions:||7.40(w) x 9.20(h) x 0.60(d)|
About the Author
Kimberly Graves, CEH, CWSP, CWNP, and CWNA, has over ten years of IT experience. She currently works as an instructor with Symbol Technologies and other leading wireless and security vendors. She has served as subject matter expert for several certification programs, including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer.
Table of Contents
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 2: Footprinting and Social Engineering.
Chapter 3: Scanning and Enumeration.
Chapter 4: System Hacking.
Chapter 5: Trojans, Backdoors, Viruses, and Worms.
Chapter 6: Sniffers.
Chapter 7: Denial of Service and Session Hijacking.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
Chapter 9: SQL Injection and Buffer Overflows.
Chapter 10: Wireless Hacking.
Chapter 11: Physical Security.
Chapter 12: Linux Hacking.
Chapter 13: Evading IDSs, Honeypots, and Firewalls.
Chapter 14: Cryptography.
Chapter 15: Penetration Testing Methodologies.