Official Certified Ethical Hacker Study Guide

Posted by Unknown  |  at  06:55

 


Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.The Certified Ethical Hacker exam is quickly becoming one of the most popular security certifications offered today. Candidates much prove their ability in not only identifying security risks from all levels, but also how to address those risks. This book provides a concise, easy to follow approach to this difficult exam.

the contents are as follow
Chapter 1     Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2     Footprinting and Social Engineering
Chapter 3     Scanning and Enumeration
Chapter 4     System Hacking
Chapter 5     Trojans, Backdoors, Viruses, and Worms
Chapter 6     Sniffers
Chapter 7     Denial of Service and Session Hijacking
Chapter 8     Hacking Web Servers, Web Application Vulnerabilities,
                    and Web-Based Password Cracking Techniques
Chapter 9     SQL Injection and Buffer Overflows
Chapter 10   Wireless Hacking
Chapter 11   Physical Security
Chapter 12   Linux Hacking 177
Chapter 13   Evading IDSs, Honeypots, and Firewalls
Chapter 14   Cryptography
Chapter 15   Penetration Testing Methodologies

DOWNLOAD (torrent link) 

About the Author

Write admin description here..

Get Updates

Subscribe to our e-mail newsletter to receive updates.

Share This Post

Related posts

© 2013 software hacked. WP Theme-junkie converted by BloggerTheme9
Blogger templates. Proudly Powered by Blogger.
back to top