CEH Certified Ethical Hacker Study Guide Front Cover

CEH Certified Ethical Hacker Study Guide

  • Length: 432 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2010-04-26
  • ISBN-10: 0470525207
  • ISBN-13: 9780470525203
  • Sales Rank: #1565057 (See Top 100 Books)
Description

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350

Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.

What’s Inside:

  • Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
  • Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
  • Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

Table of Contents

Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
Chapter 3: Gathering Network and Host Information: Scanning and Enumeration
Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: Sniffers
Chapter 7: Denial of Service and Session Hijacking
Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10: Wireless Network Hacking
Chapter 11: Physical Site Security
Chapter 12: Hacking Linux Systems
Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls
Chapter 14: Cryptography
Chapter 15: Performing a Penetration Test
Appendix: About the Companion CD

To access the link, solve the captcha.