CEH Certified Ethical Hacker Study Guide
- Length: 432 pages
- Edition: 1
- Language: English
- Publisher: Sybex
- Publication Date: 2010-04-26
- ISBN-10: 0470525207
- ISBN-13: 9780470525203
- Sales Rank: #1565057 (See Top 100 Books)
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350
Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.
What’s Inside:
- Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
- Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
- Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf
Table of Contents
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
Chapter 3: Gathering Network and Host Information: Scanning and Enumeration
Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: Sniffers
Chapter 7: Denial of Service and Session Hijacking
Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10: Wireless Network Hacking
Chapter 11: Physical Site Security
Chapter 12: Hacking Linux Systems
Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls
Chapter 14: Cryptography
Chapter 15: Performing a Penetration Test
Appendix: About the Companion CD
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.