CEH Certified Ethical Hacker Study Guide
- Length: 432 pages
- Edition: 1
- Language: English
- Publisher: Sybex
- Publication Date: 2010-04-26
- ISBN-10: 0470525207
- ISBN-13: 9780470525203
- Sales Rank: #1565057 (See Top 100 Books)
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350
Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.
What’s Inside:
- Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
- Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
- Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf
Table of Contents
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
Chapter 3: Gathering Network and Host Information: Scanning and Enumeration
Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: Sniffers
Chapter 7: Denial of Service and Session Hijacking
Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10: Wireless Network Hacking
Chapter 11: Physical Site Security
Chapter 12: Hacking Linux Systems
Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls
Chapter 14: Cryptography
Chapter 15: Performing a Penetration Test
Appendix: About the Companion CD