CEH: Official Certified Ethical Hacker Review Guide (Exam 312-50)
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
- Wiley
More About This Title CEH: Official Certified Ethical Hacker Review Guide (Exam 312-50)
- English
English
Kimberly Graves, CEH, CWSP, CWNP, and CWNA, has over ten years of IT experience. She currently works as an instructor with Symbol Technologies and other leading wireless and security vendors. She has served as subject matter expert for several certification programs, including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer.
- English
English
Introduction.
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 2: Footprinting and Social Engineering.
Chapter 3: Scanning and Enumeration.
Chapter 4: System Hacking.
Chapter 5: Trojans, Backdoors, Viruses, and Worms.
Chapter 6: Sniffers.
Chapter 7: Denial of Service and Session Hijacking.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
Chapter 9: SQL Injection and Buffer Overflows.
Chapter 10: Wireless Hacking.
Chapter 11: Physical Security.
Chapter 12: Linux Hacking.
Chapter 13: Evading IDSs, Honeypots, and Firewalls.
Chapter 14: Cryptography.
Chapter 15: Penetration Testing Methodologies.
Glossary.
Index.